ock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 06:30:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 380.065472][ T8311] netdevsim netdevsim2 netdevsim2: renamed from eth2 06:30:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 380.272070][ T8311] netdevsim netdevsim2 netdevsim3: renamed from eth3 06:30:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:49 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:51 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:52 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 384.123546][ T8307] netdevsim netdevsim4 netdevsim0: renamed from eth0 06:30:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 384.660469][ T8307] netdevsim netdevsim4 netdevsim1: renamed from eth1 06:30:53 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) 06:30:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:57 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:57 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:57 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:58 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r7, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r8, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 389.810255][ T8307] netdevsim netdevsim4 netdevsim2: renamed from eth2 06:30:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) [ 390.150337][ T8307] netdevsim netdevsim4 netdevsim3: renamed from eth3 06:30:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:31:00 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:31:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:31:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r7, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r8, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000, 0xa784}) 06:31:02 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000, 0xa784}) 06:31:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000, 0xa784}) [ 394.468930][ T8311] 8021q: adding VLAN 0 to HW filter on device bond0 06:31:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000, 0xa784}) 06:31:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r7, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r8, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 394.532134][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.547737][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.560174][ T8311] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.610926][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.628407][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.647250][ T3634] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.654397][ T3634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.716979][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.725800][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.777439][ T3634] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.784576][ T3634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.821323][ T8307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.862847][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.928921][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 394.948017][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 394.980804][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 395.013217][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:31:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000, 0xa784}) [ 395.047580][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 395.087322][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 395.098799][ T8307] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.158206][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 395.187417][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 395.196322][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.237696][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.246270][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.297756][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 395.306353][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.347966][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.382316][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.397218][ T3636] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.404348][ T3636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.433871][ T8311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 06:31:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000, 0xa784}) [ 395.450280][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 395.475925][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 06:31:04 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 395.508243][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.527425][ T3634] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.534548][ T3634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.585634][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 395.608973][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 395.657439][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 395.680037][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 395.710881][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 395.745535][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.770094][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.809878][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 06:31:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:05 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 398.213917][ T8307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 398.236321][ T8307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 398.257150][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 398.265436][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 398.319782][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000}) [ 398.524571][ T8311] 8021q: adding VLAN 0 to HW filter on device batadv0 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000}) [ 398.599314][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 398.611705][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000}) [ 398.667037][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 398.675819][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 398.726833][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 398.735347][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 398.769107][ T8311] device veth0_vlan entered promiscuous mode [ 398.781303][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.807892][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.837778][ T8311] device veth1_vlan entered promiscuous mode 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 398.884394][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 398.907761][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 398.927478][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 398.941411][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 398.971962][ T8311] device veth0_macvtap entered promiscuous mode [ 398.996273][ T8311] device veth1_macvtap entered promiscuous mode [ 399.043188][ T8307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 399.073198][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 399.084846][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 06:31:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.109810][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 399.127098][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 399.153224][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.188530][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 06:31:08 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.216285][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.256916][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 06:31:08 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:08 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.306844][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.336852][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 399.386819][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.407094][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 399.427367][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.467215][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 399.498453][ T8311] batman_adv: batadv0: Interface activated: batadv_slave_0 06:31:08 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.513725][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 399.539544][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2}) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2}) 06:31:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:10 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r5, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r8, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r6, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r7) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r9, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 06:31:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:12 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:12 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:12 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:12 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r5, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r8, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r6, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r7) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r9, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:13 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r5, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r8, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r6, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r7) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r9, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 06:31:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 06:31:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 06:31:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 06:31:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 06:31:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:17 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 409.058297][ T3570] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 409.067685][ T3570] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 409.075614][ T3570] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 409.084164][ T3570] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 409.091972][ T3570] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 409.100110][ T3570] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 409.181890][ T48] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 409.191723][ T48] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 409.201063][ T48] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 409.209287][ T48] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 409.220125][ T48] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 06:31:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 409.227956][ T48] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 06:31:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 411.189774][ T3558] Bluetooth: hci1: command 0x0409 tx timeout [ 411.266956][ T3558] Bluetooth: hci2: command 0x0409 tx timeout 06:31:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) 06:31:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:20 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:22 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 413.266967][ T3558] Bluetooth: hci1: command 0x041b tx timeout [ 413.346908][ T48] Bluetooth: hci2: command 0x041b tx timeout 06:31:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:23 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 415.353291][ T48] Bluetooth: hci1: command 0x040f tx timeout 06:31:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 415.426987][ T48] Bluetooth: hci2: command 0x040f tx timeout [ 415.528397][ T9273] chnl_net:caif_netlink_parms(): no params data found 06:31:25 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:26 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 417.426960][ T48] Bluetooth: hci1: command 0x0419 tx timeout 06:31:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, 0xffffffffffffffff], 0x3) [ 417.507094][ T48] Bluetooth: hci2: command 0x0419 tx timeout 06:31:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:27 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) 06:31:29 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 420.380360][ T9270] chnl_net:caif_netlink_parms(): no params data found 06:31:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) 06:31:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:30 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) 06:31:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) [ 422.760186][ T9273] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.767373][ T9273] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.801400][ T9273] device bridge_slave_0 entered promiscuous mode [ 422.892090][ T9273] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.899549][ T9273] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:31 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 422.967527][ T9273] device bridge_slave_1 entered promiscuous mode 06:31:33 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:33 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:34 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:35 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:35 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:36 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:36 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:38 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:38 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:39 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 430.260301][ T9273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 06:31:39 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:40 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 431.827162][ T3558] Bluetooth: hci5: command 0x0406 tx timeout [ 431.833233][ T3558] Bluetooth: hci6: command 0x0406 tx timeout 06:31:40 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:41 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 433.021022][ T11] device hsr_slave_0 left promiscuous mode 06:31:42 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:42 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:42 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 434.057373][ T11] device hsr_slave_1 left promiscuous mode 06:31:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:43 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:43 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 434.902133][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 434.914686][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 435.194541][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 435.216868][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:44 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 435.426472][ T11] device bridge_slave_1 left promiscuous mode [ 435.456338][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:45 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 436.134984][ T11] device bridge_slave_0 left promiscuous mode [ 436.147636][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:46 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:46 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 437.878394][ T11] device hsr_slave_0 left promiscuous mode 06:31:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:47 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 438.242320][ T11] device hsr_slave_1 left promiscuous mode 06:31:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:48 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 439.021076][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 439.047666][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 439.278394][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 439.285875][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:48 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:48 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 439.793519][ T11] device bridge_slave_1 left promiscuous mode [ 439.807072][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:48 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 439.988551][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.994864][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 440.397467][ T11] device bridge_slave_0 left promiscuous mode [ 440.403726][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 441.133413][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 441.641485][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 441.811051][ T11] device bridge_slave_1 left promiscuous mode [ 441.827726][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:50 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:50 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:51 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 442.260115][ T11] device bridge_slave_0 left promiscuous mode [ 442.266430][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:51 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:51 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) [ 442.612116][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:51 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 442.703244][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 443.022338][ T11] device bridge_slave_1 left promiscuous mode [ 443.039172][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0, 0xffffffffffffffff], 0x2) 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0, 0xffffffffffffffff], 0x2) 06:31:52 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0, 0xffffffffffffffff], 0x2) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 443.957902][ T11] device bridge_slave_0 left promiscuous mode [ 443.964192][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:53 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:53 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 444.897977][ T11] device hsr_slave_0 left promiscuous mode 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 445.702697][ T11] device hsr_slave_1 left promiscuous mode 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:55 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:55 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 446.217487][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 446.442941][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:55 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) [ 446.890353][ T11] device bridge_slave_1 left promiscuous mode [ 446.896641][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:56 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) 06:31:56 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:31:56 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) [ 447.887820][ T11] device bridge_slave_0 left promiscuous mode [ 447.894084][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:57 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:31:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:57 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 448.324851][ T11] device hsr_slave_0 left promiscuous mode 06:31:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 448.383158][ T11] device hsr_slave_1 left promiscuous mode [ 448.390821][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 448.439282][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 448.486423][ T11] device bridge_slave_1 left promiscuous mode [ 448.493085][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 449.301701][ T11] device bridge_slave_0 left promiscuous mode [ 449.308178][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:59 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) 06:32:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:00 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:32:00 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 451.889792][ T11] device hsr_slave_0 left promiscuous mode 06:32:01 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:01 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) 06:32:01 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:02 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:02 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 453.497260][ T11] device hsr_slave_1 left promiscuous mode 06:32:02 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:03 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) 06:32:03 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:03 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:03 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) [ 455.139285][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 455.755249][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:05 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 456.189772][ T11] device bridge_slave_1 left promiscuous mode [ 456.196002][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:32:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 457.047506][ T11] device bridge_slave_0 left promiscuous mode [ 457.053833][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:32:06 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:06 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:06 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:07 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:07 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 06:32:07 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:07 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:07 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:08 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:08 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:08 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:08 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:08 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:08 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) 06:32:09 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) [ 460.157226][ T11] device veth1_macvtap left promiscuous mode [ 460.163340][ T11] device veth0_macvtap left promiscuous mode [ 460.190785][ T11] device veth1_vlan left promiscuous mode [ 460.196671][ T11] device veth0_vlan left promiscuous mode 06:32:09 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:10 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:10 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:11 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a") [ 462.197250][ T11] device veth1_macvtap left promiscuous mode [ 462.204060][ T11] device veth0_macvtap left promiscuous mode [ 462.229148][ T11] device veth1_vlan left promiscuous mode [ 462.235123][ T11] device veth0_vlan left promiscuous mode 06:32:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:12 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a") 06:32:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:32:14 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a") 06:32:14 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:32:15 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) 06:32:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:16 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:16 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970") 06:32:16 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:16 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:17 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:17 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970") 06:32:17 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:18 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:18 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:19 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:32:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970") 06:32:19 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:32:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:20 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:32:20 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:20 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609") 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609") 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 475.381837][ T3558] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 475.390974][ T3558] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 475.399367][ T3570] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 475.408155][ T3558] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 475.415787][ T3558] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 475.423525][ T3558] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 475.490909][ T48] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 475.500225][ T48] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 475.508398][ T48] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 475.516361][ T48] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 475.524732][ T48] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 475.532056][ T48] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609") 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:26 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0], 0x1) [ 477.507387][ T3558] Bluetooth: hci3: command 0x0409 tx timeout 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) [ 477.587008][ T3558] Bluetooth: hci4: command 0x0409 tx timeout 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be6036") 06:32:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:28 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be6036") [ 479.586887][ T3558] Bluetooth: hci3: command 0x041b tx timeout [ 479.667228][ T3558] Bluetooth: hci4: command 0x041b tx timeout 06:32:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:29 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be6036") 06:32:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) [ 481.666948][ T3558] Bluetooth: hci3: command 0x040f tx timeout 06:32:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 481.747210][ T3558] Bluetooth: hci4: command 0x040f tx timeout 06:32:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:31 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c44") 06:32:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 483.747338][ T3558] Bluetooth: hci3: command 0x0419 tx timeout [ 483.826991][ T48] Bluetooth: hci4: command 0x0419 tx timeout 06:32:32 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c44") 06:32:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:33 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:33 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:34 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c44") 06:32:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:35 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:35 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:36 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:37 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625") 06:32:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:39 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625") 06:32:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 06:32:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 06:32:40 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625") 06:32:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:42 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25") 06:32:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:43 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:43 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0), 0x48) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0), 0x48) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0), 0x48) 06:32:44 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25") 06:32:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:46 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25") 06:32:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 501.429472][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.435814][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 06:32:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:32:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:00 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 511.251663][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:00 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:01 executing program 1: accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) [ 512.798420][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:02 executing program 1: accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x80000) 06:33:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:03 executing program 1: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) [ 514.623780][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:03 executing program 1: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:33:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 517.189111][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r1 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r1}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 522.558941][ T11] bond0 (unregistering): Released all slaves 06:33:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 06:33:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:14 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:33:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:33:16 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:16 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:33:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:17 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:20 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:21 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:21 executing program 3: syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 533.583093][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:22 executing program 3: syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 534.227117][ T48] Bluetooth: hci2: command 0x0406 tx timeout [ 534.227126][ T3558] Bluetooth: hci1: command 0x0406 tx timeout [ 534.253300][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:23 executing program 3: syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 534.477556][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:24 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) [ 535.707317][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:24 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:25 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:26 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:33:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:26 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:27 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:27 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:28 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) 06:33:28 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) [ 539.707560][ T11] bond0 (unregistering): Released all slaves 06:33:29 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:29 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) 06:33:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:29 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, 0x0, &(0x7f0000000580)) 06:33:29 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, 0x0, &(0x7f0000000580)) 06:33:29 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:30 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, 0x0, &(0x7f0000000580)) 06:33:30 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), 0x0) [ 541.799262][ T48] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 541.815659][ T48] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 06:33:30 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), 0x0) [ 541.850794][ T3558] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 541.858665][ T3558] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 541.868881][ T3558] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 541.872834][ T11] team0 (unregistering): Port device team_slave_1 removed [ 541.877236][ T3558] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 541.892757][ T3558] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 541.900929][ T3558] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 541.917077][T10631] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 541.925765][T10631] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 541.935770][ T3570] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 541.943634][ T3570] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 06:33:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:31 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:31 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), 0x0) 06:33:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 542.683934][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:32 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) [ 543.400658][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:32 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:32 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) [ 543.987052][ T3570] Bluetooth: hci8: command 0x0409 tx timeout [ 543.993527][ T3570] Bluetooth: hci7: command 0x0409 tx timeout 06:33:33 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:33 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 544.445546][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:33 executing program 3: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:33 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:34 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, 0x0, &(0x7f0000000580)) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) 06:33:34 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) 06:33:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 546.067794][ T48] Bluetooth: hci7: command 0x041b tx timeout [ 546.073866][ T48] Bluetooth: hci8: command 0x041b tx timeout 06:33:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:35 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:36 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 548.157123][ T48] Bluetooth: hci8: command 0x040f tx timeout [ 548.163229][ T48] Bluetooth: hci7: command 0x040f tx timeout 06:33:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:37 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:33:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 549.364299][ T11] bond0 (unregistering): Released all slaves 06:33:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 550.227149][ T3570] Bluetooth: hci7: command 0x0419 tx timeout [ 550.233218][ T3570] Bluetooth: hci8: command 0x0419 tx timeout 06:33:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:33:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:33:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 552.479048][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:33:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 553.896168][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 554.597410][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 555.949736][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:47 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:47 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:47 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:48 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:48 executing program 3: io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:49 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:49 executing program 3: io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:33:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 561.917631][ T11] bond0 (unregistering): Released all slaves 06:33:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 562.870001][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.876335][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 06:33:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:52 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:53 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:54 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:33:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:33:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) [ 569.287955][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:33:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)) [ 570.007822][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:33:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:33:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) [ 570.864125][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:34:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:00 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:34:01 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) [ 572.257425][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:34:01 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0x0, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:34:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0x6, 0x4, 0x2, 0x1c, 0x18, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x0, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x0, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0x0, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) [ 577.247970][ T11] bond0 (unregistering): Released all slaves 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x0, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:07 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001900)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000018c0), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001900)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000018c0), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:09 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 580.885436][ T11] team0 (unregistering): Port device team_slave_1 removed 06:34:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) [ 581.770653][ T11] team0 (unregistering): Port device team_slave_0 removed 06:34:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 582.887192][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:34:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 583.667935][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:34:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 584.884513][ T11] bond0 (unregistering): Released all slaves 06:34:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 586.546979][ T28] INFO: task kworker/0:0:7 blocked for more than 143 seconds. [ 586.555139][ T28] Not tainted 6.1.79-syzkaller #0 [ 586.582169][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 586.616819][ T28] task:kworker/0:0 state:D stack:22848 pid:7 ppid:2 flags:0x00004000 [ 586.635335][ T28] Workqueue: events switchdev_deferred_process_work [ 586.649225][ T28] Call Trace: [ 586.652547][ T28] [ 586.682592][ T28] __schedule+0x142d/0x4550 [ 586.693567][ T28] ? release_firmware_map_entry+0x18a/0x18a [ 586.708866][ T28] ? print_irqtrace_events+0x210/0x210 [ 586.714506][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 586.743663][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 586.769116][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 586.774443][ T28] schedule+0xbf/0x180 [ 586.799296][ T28] schedule_preempt_disabled+0xf/0x20 [ 586.804739][ T28] __mutex_lock+0x6b9/0xd80 [ 586.825268][ T28] ? __mutex_lock+0x53c/0xd80 [ 586.835921][ T28] ? switchdev_deferred_process_work+0xa/0x20 [ 586.851174][ T28] ? mutex_lock_nested+0x10/0x10 [ 586.856203][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 586.889074][ T28] ? process_one_work+0x7a9/0x11d0 [ 586.894318][ T28] switchdev_deferred_process_work+0xa/0x20 [ 586.913981][ T28] process_one_work+0x8a9/0x11d0 [ 586.927152][ T28] ? worker_detach_from_pool+0x260/0x260 [ 586.932856][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 586.954404][ T28] ? kthread_data+0x4e/0xc0 [ 586.966118][ T28] ? wq_worker_running+0x97/0x190 [ 586.991270][ T28] worker_thread+0xa47/0x1200 [ 586.996014][ T28] ? release_firmware_map_entry+0x18a/0x18a [ 587.014625][ T28] kthread+0x28d/0x320 [ 587.025757][ T28] ? worker_clr_flags+0x190/0x190 [ 587.039023][ T28] ? kthread_blkcg+0xd0/0xd0 [ 587.043684][ T28] ret_from_fork+0x1f/0x30 06:34:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 587.071284][ T28] [ 587.074492][ T28] INFO: task kworker/0:7:3634 blocked for more than 143 seconds. [ 587.097203][ T28] Not tainted 6.1.79-syzkaller #0 [ 587.102801][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 06:34:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 587.146822][ T28] task:kworker/0:7 state:D stack:24728 pid:3634 ppid:2 flags:0x00004000 [ 587.156325][ T28] Workqueue: events linkwatch_event [ 587.187420][ T28] Call Trace: [ 587.190812][ T28] [ 587.193763][ T28] __schedule+0x142d/0x4550 [ 587.236822][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 587.242107][ T28] ? release_firmware_map_entry+0x18a/0x18a [ 587.266816][ T28] ? print_irqtrace_events+0x210/0x210 [ 587.272857][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 587.286797][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 587.292062][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 587.316885][ T28] schedule+0xbf/0x180 [ 587.321025][ T28] schedule_preempt_disabled+0xf/0x20 [ 587.326424][ T28] __mutex_lock+0x6b9/0xd80 [ 587.356801][ T28] ? __mutex_lock+0x53c/0xd80 [ 587.361562][ T28] ? linkwatch_event+0xa/0x50 [ 587.366274][ T28] ? mutex_lock_nested+0x10/0x10 [ 587.406857][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 587.412409][ T28] ? process_one_work+0x7a9/0x11d0 [ 587.422754][ T28] linkwatch_event+0xa/0x50 [ 587.453731][ T28] process_one_work+0x8a9/0x11d0 [ 587.486888][ T28] ? worker_detach_from_pool+0x260/0x260 [ 587.492600][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 587.537007][ T28] ? kthread_data+0x4e/0xc0 [ 587.541592][ T28] ? wq_worker_running+0x97/0x190 [ 587.546652][ T28] worker_thread+0xa47/0x1200 [ 587.569122][ T28] ? _raw_spin_unlock+0x40/0x40 [ 587.574057][ T28] ? release_firmware_map_entry+0x18a/0x18a [ 587.598018][ T28] ? _raw_spin_unlock+0x40/0x40 [ 587.602950][ T28] kthread+0x28d/0x320 [ 587.637045][ T28] ? worker_clr_flags+0x190/0x190 [ 587.642139][ T28] ? kthread_blkcg+0xd0/0xd0 [ 587.647145][ T28] ret_from_fork+0x1f/0x30 [ 587.651630][ T28] [ 587.654725][ T28] INFO: task syz-executor.4:9270 blocked for more than 144 seconds. [ 587.698003][ T28] Not tainted 6.1.79-syzkaller #0 [ 587.703601][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 587.736857][ T28] task:syz-executor.4 state:D stack:21736 pid:9270 ppid:1 flags:0x00004006 [ 587.746128][ T28] Call Trace: [ 587.766808][ T28] [ 587.769802][ T28] __schedule+0x142d/0x4550 [ 587.774350][ T28] ? __mutex_lock+0x6b4/0xd80 [ 587.798644][ T28] ? release_firmware_map_entry+0x18a/0x18a [ 587.804594][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 587.829722][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 587.835008][ T28] schedule+0xbf/0x180 [ 587.850729][ T28] schedule_preempt_disabled+0xf/0x20 [ 587.856239][ T28] __mutex_lock+0x6b9/0xd80 [ 587.878000][ T28] ? __mutex_lock+0x53c/0xd80 [ 587.883249][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 587.908083][ T28] ? mutex_lock_nested+0x10/0x10 [ 587.913101][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 587.949888][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 587.969079][ T28] ? rtnetlink_bind+0x80/0x80 [ 587.973824][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 587.989497][ T28] ? kernel_text_address+0x9f/0xd0 [ 588.016918][ T28] ? __kernel_text_address+0x9/0x40 [ 588.022335][ T28] ? unwind_get_return_address+0x49/0x80 [ 588.057296][ T28] ? arch_stack_walk+0xf3/0x140 [ 588.062304][ T28] ? mark_lock+0x9a/0x340 [ 588.066673][ T28] ? mark_lock+0x9a/0x340 [ 588.109225][ T28] ? __lock_acquire+0x125b/0x1f80 [ 588.114486][ T28] netlink_rcv_skb+0x1cd/0x410 [ 588.138049][ T28] ? rtnetlink_bind+0x80/0x80 [ 588.142803][ T28] ? netlink_ack+0x1290/0x1290 [ 588.179159][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 588.184656][ T28] netlink_unicast+0x7d8/0x970 [ 588.207156][ T28] ? netlink_detachskb+0x90/0x90 [ 588.212191][ T28] ? __virt_addr_valid+0x44a/0x520 [ 588.236873][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 588.266818][ T28] ? __check_object_size+0x4dd/0xa30 [ 588.272272][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 588.309337][ T28] netlink_sendmsg+0xa26/0xd60 [ 588.314265][ T28] ? netlink_getsockopt+0x580/0x580 [ 588.333727][ T28] ? __might_fault+0xa1/0x110 [ 588.366788][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 588.372053][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 588.406912][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 588.412635][ T28] ? netlink_getsockopt+0x580/0x580 [ 588.438045][ T28] __sys_sendto+0x480/0x600 [ 588.442780][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 588.488087][ T28] ? print_irqtrace_events+0x210/0x210 [ 588.505074][ T28] __x64_sys_sendto+0xda/0xf0 [ 588.517957][ T28] do_syscall_64+0x3d/0xb0 [ 588.522472][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 588.556815][ T28] RIP: 0033:0x7f479f87fa9c [ 588.561287][ T28] RSP: 002b:00007ffd7fcfb150 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 588.598514][ T28] RAX: ffffffffffffffda RBX: 00007f47a04d4620 RCX: 00007f479f87fa9c [ 588.621342][ T28] RDX: 0000000000000028 RSI: 00007f47a04d4670 RDI: 0000000000000003 [ 588.647137][ T28] RBP: 0000000000000000 R08: 00007ffd7fcfb1a4 R09: 000000000000000c [ 588.679074][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 588.704889][ T28] R13: 0000000000000000 R14: 00007f47a04d4670 R15: 0000000000000000 [ 588.737056][ T28] [ 588.748482][ T28] INFO: task syz-executor.2:9273 blocked for more than 145 seconds. [ 588.765176][ T28] Not tainted 6.1.79-syzkaller #0 [ 588.786987][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 588.795717][ T28] task:syz-executor.2 state:D stack:21736 pid:9273 ppid:1 flags:0x00004006 [ 588.846928][ T28] Call Trace: [ 588.850257][ T28] [ 588.857117][ T28] __schedule+0x142d/0x4550 [ 588.867507][ T28] ? __mutex_lock+0x6b4/0xd80 [ 588.872232][ T28] ? release_firmware_map_entry+0x18a/0x18a [ 588.898004][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 588.903618][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 588.936945][ T28] schedule+0xbf/0x180 [ 588.941080][ T28] schedule_preempt_disabled+0xf/0x20 [ 588.946477][ T28] __mutex_lock+0x6b9/0xd80 [ 588.976798][ T28] ? __mutex_lock+0x53c/0xd80 [ 588.981541][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 588.986691][ T28] ? mutex_lock_nested+0x10/0x10 06:34:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 589.031630][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 589.077638][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 589.082668][ T28] ? rtnetlink_bind+0x80/0x80 [ 589.106935][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 589.114842][ T28] ? kernel_text_address+0x9f/0xd0 [ 589.127986][ T28] ? __kernel_text_address+0x9/0x40 [ 589.133249][ T28] ? unwind_get_return_address+0x49/0x80 [ 589.169290][ T28] ? arch_stack_walk+0xf3/0x140 [ 589.174204][ T28] ? mark_lock+0x9a/0x340 [ 589.196959][ T28] ? mark_lock+0x9a/0x340 [ 589.201618][ T28] ? __lock_acquire+0x125b/0x1f80 [ 589.206714][ T28] netlink_rcv_skb+0x1cd/0x410 [ 589.241641][ T28] ? rtnetlink_bind+0x80/0x80 [ 589.287074][ T28] ? netlink_ack+0x1290/0x1290 [ 589.291991][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 589.306856][ T28] netlink_unicast+0x7d8/0x970 [ 589.311797][ T28] ? netlink_detachskb+0x90/0x90 [ 589.329534][ T28] ? __virt_addr_valid+0x44a/0x520 [ 589.349202][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 589.354299][ T28] ? __check_object_size+0x4dd/0xa30 [ 589.376878][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 589.385695][ T28] netlink_sendmsg+0xa26/0xd60 [ 589.406877][ T28] ? netlink_getsockopt+0x580/0x580 [ 589.412151][ T28] ? __might_fault+0xa1/0x110 [ 589.443534][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 589.459426][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 589.479032][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 589.484560][ T28] ? netlink_getsockopt+0x580/0x580 [ 589.510975][ T28] __sys_sendto+0x480/0x600 [ 589.515611][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 589.536810][ T28] ? print_irqtrace_events+0x210/0x210 [ 589.561482][ T28] __x64_sys_sendto+0xda/0xf0 [ 589.566475][ T28] do_syscall_64+0x3d/0xb0 [ 589.599198][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 589.605165][ T28] RIP: 0033:0x7fd2c047fa9c [ 589.646816][ T28] RSP: 002b:00007ffe704dcf60 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 589.655514][ T28] RAX: ffffffffffffffda RBX: 00007fd2c10d4620 RCX: 00007fd2c047fa9c [ 589.708005][ T28] RDX: 0000000000000028 RSI: 00007fd2c10d4670 RDI: 0000000000000003 [ 589.716205][ T28] RBP: 0000000000000000 R08: 00007ffe704dcfb4 R09: 000000000000000c [ 589.761449][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 589.781676][ T28] R13: 0000000000000000 R14: 00007fd2c10d4670 R15: 0000000000000000 [ 589.817971][ T28] [ 589.821105][ T28] [ 589.821105][ T28] Showing all locks held in the system: [ 589.850781][ T28] 3 locks held by kworker/0:0/7: [ 589.855959][ T28] #0: ffff888012470938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 06:34:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001f40)=""/253, 0xfd}, {&(0x7f0000002040)=""/78, 0x4e}], 0x2, &(0x7f0000002100)=[@cred={{0x1c}}], 0x20}, 0x10042) [ 589.907527][ T28] #1: ffffc900000c7d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 589.957303][ T28] #2: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 589.996888][ T28] 5 locks held by kworker/u4:1/11: [ 590.002045][ T28] #0: ffff888012616938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.046879][ T28] #1: ffffc90000107d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.077264][ T28] #2: ffffffff8e288c10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 590.096948][ T28] #3: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0xe5/0x9d0 [ 590.107502][ T28] #4: ffffffff8d12feb8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x479/0x8a0 [ 590.137225][ T28] 1 lock held by rcu_tasks_kthre/12: [ 590.142626][ T28] #0: ffffffff8d12aa90 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 590.176907][ T28] 1 lock held by rcu_tasks_trace/13: [ 590.182381][ T28] #0: ffffffff8d12b290 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 590.206798][ T28] 1 lock held by khungtaskd/28: [ 590.211789][ T28] #0: ffffffff8d12a8c0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x51/0x290 [ 590.266998][ T28] 2 locks held by getty/3300: [ 590.271720][ T28] #0: ffff8880294f8098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 06:34:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 590.317274][ T28] #1: ffffc900031262f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6a7/0x1db0 [ 590.334278][ T28] 3 locks held by kworker/0:3/3545: [ 590.377299][ T28] #0: ffff888028474d38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.426910][ T28] #1: ffffc90003bdfd20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.441238][ T28] #2: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 [ 590.483013][ T28] 2 locks held by kworker/0:5/3604: [ 590.497273][ T28] #0: ffff888012472138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.557268][ T28] #1: ffffc90004a2fd20 ((work_completion)(&rew->rew_work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.586865][ T28] 3 locks held by kworker/0:7/3634: [ 590.592178][ T28] #0: ffff888012470938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.637057][ T28] #1: ffffc90004db7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.677385][ T28] #2: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 590.686516][ T28] 5 locks held by kworker/u4:8/3739: [ 590.718109][ T28] 2 locks held by kworker/u4:17/7008: [ 590.723627][ T28] #0: ffff888012479138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.779261][ T28] #1: ffffc900057c7d20 ((work_completion)(&ctx->exit_work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.821355][ T28] 2 locks held by kworker/u4:18/7010: [ 590.843855][ T28] 2 locks held by kworker/u4:24/7294: [ 590.886787][ T28] #0: ffff888012479138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.915579][ T28] #1: ffffc9000adcfd20 ((work_completion)(&ctx->exit_work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 590.950532][ T28] 3 locks held by kworker/1:11/8427: [ 590.980699][ T28] #0: ffff888028474d38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 591.016841][ T28] #1: ffffc9000345fd20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 591.047307][ T28] #2: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 [ 591.081745][ T28] 1 lock held by syz-executor.4/9270: [ 591.087844][ T28] #0: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 591.117023][ T28] 1 lock held by syz-executor.2/9273: [ 591.122444][ T28] #0: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 591.160306][ T28] 1 lock held by syz-executor.4/10018: [ 591.165817][ T28] #0: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 591.208397][ T28] 1 lock held by syz-executor.2/10021: [ 591.213995][ T28] #0: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 591.256945][ T28] 1 lock held by syz-executor.2/10627: [ 591.277899][ T28] #0: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 591.306839][ T28] 1 lock held by syz-executor.4/10629: [ 591.312344][ T28] #0: ffffffff8e294e68 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 591.366851][ T28] 1 lock held by syz-executor.3/10835: [ 591.372532][ T28] 3 locks held by syz-executor.0/10860: [ 591.399275][ T28] #0: ffff888029f46460 (sb_writers#4){.+.+}-{0:0}, at: do_coredump+0x1892/0x2700 [ 591.446895][ T28] #1: ffff888080b8a218 (&sb->s_type->i_mutex_key#8){++++}-{3:3}, at: ext4_buffered_write_iter+0xaf/0x3a0 [ 591.478015][ T28] #2: ffff888029f460e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 06:34:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r1 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r1}) [ 591.509142][ T28] 2 locks held by syz-executor.0/10881: [ 591.514740][ T28] 3 locks held by syz-executor.3/10883: [ 591.538058][ T28] 2 locks held by syz-executor.3/10898: [ 591.543666][ T28] 3 locks held by syz-executor.0/10900: [ 591.588311][ T28] 3 locks held by syz-executor.3/10912: [ 591.593926][ T28] 2 locks held by syz-executor.0/10923: [ 591.616785][ T28] 3 locks held by syz-executor.3/10926: [ 591.622420][ T28] 2 locks held by syz-executor.0/10936: [ 591.640988][ T28] 2 locks held by syz-executor.3/10938: [ 591.646579][ T28] 3 locks held by syz-executor.0/10974: [ 591.686897][ T28] 2 locks held by syz-executor.0/11026: [ 591.692497][ T28] 1 lock held by syz-executor.1/11075: [ 591.722753][ T28] 2 locks held by syz-executor.0/11078: [ 591.736865][ T28] 3 locks held by syz-executor.1/11081: [ 591.742538][ T28] 2 locks held by syz-executor.1/11094: [ 591.769954][ T28] 3 locks held by syz-executor.0/11096: [ 591.776003][ T28] 3 locks held by syz-executor.1/11100: [ 591.806808][ T28] 3 locks held by syz-executor.1/11106: [ 591.812678][ T28] 3 locks held by syz-executor.1/11112: [ 591.847462][ T28] 2 locks held by syz-executor.3/11118: [ 591.866958][ T28] 3 locks held by syz-executor.1/11121: [ 591.883631][ T28] 2 locks held by syz-executor.0/11123: [ 591.907423][ T28] 3 locks held by syz-executor.3/11130: [ 591.913022][ T28] 2 locks held by syz-executor.1/11132: [ 591.947258][ T28] 3 locks held by syz-executor.1/11139: [ 591.957162][ T28] 3 locks held by syz-executor.0/11141: [ 591.962747][ T28] 2 locks held by syz-executor.3/11146: [ 591.996855][ T28] 2 locks held by syz-executor.1/11148: [ 592.002453][ T28] 2 locks held by syz-executor.0/11154: [ 592.036845][ T28] 2 locks held by syz-executor.1/11158: [ 592.042442][ T28] 3 locks held by syz-executor.3/11161: [ 592.081917][ T28] 2 locks held by syz-executor.1/11170: [ 592.096900][ T28] 2 locks held by syz-executor.3/11173: [ 592.117094][ T28] 2 locks held by syz-executor.3/11174: [ 592.147561][ T28] #0: ffff888061f53e10 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x98/0x230 [ 592.175352][ T28] #1: ffffffff8d12feb8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x479/0x8a0 [ 592.216807][ T28] 2 locks held by syz-executor.3/11179: [ 592.222399][ T28] 1 lock held by syz-executor.0/11180: [ 592.252310][ T28] #0: ffff888073047410 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x98/0x230 [ 592.288706][ T28] 2 locks held by syz-executor.1/11184: [ 592.294309][ T28] 2 locks held by syz-executor.0/11186: [ 592.331171][ T28] [ 592.333561][ T28] ============================================= [ 592.333561][ T28] [ 592.367452][ T28] NMI backtrace for cpu 1 [ 592.371832][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.79-syzkaller #0 [ 592.379661][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 592.389823][ T28] Call Trace: [ 592.393124][ T28] [ 592.396068][ T28] dump_stack_lvl+0x1e3/0x2cb [ 592.400773][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 592.406260][ T28] ? panic+0x75d/0x75d [ 592.410346][ T28] ? vprintk_emit+0x622/0x740 [ 592.415083][ T28] ? printk_sprint+0x490/0x490 [ 592.419872][ T28] ? nmi_cpu_backtrace+0x252/0x560 [ 592.425044][ T28] nmi_cpu_backtrace+0x4e1/0x560 [ 592.430016][ T28] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 592.436202][ T28] ? _printk+0xd1/0x111 [ 592.440389][ T28] ? panic+0x75d/0x75d [ 592.444483][ T28] ? __wake_up_klogd+0xcc/0x100 [ 592.449442][ T28] ? panic+0x75d/0x75d [ 592.453532][ T28] ? nmi_trigger_cpumask_backtrace+0xe2/0x3f0 [ 592.459632][ T28] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 592.465839][ T28] nmi_trigger_cpumask_backtrace+0x1b0/0x3f0 [ 592.471850][ T28] watchdog+0xf88/0xfd0 [ 592.476067][ T28] ? watchdog+0x1f8/0xfd0 [ 592.480425][ T28] kthread+0x28d/0x320 [ 592.484527][ T28] ? hungtask_pm_notify+0x50/0x50 [ 592.489579][ T28] ? kthread_blkcg+0xd0/0xd0 [ 592.494214][ T28] ret_from_fork+0x1f/0x30 [ 592.498674][ T28] [ 592.502397][ T28] Sending NMI from CPU 1 to CPUs 0: [ 592.508775][ C0] NMI backtrace for cpu 0 [ 592.508788][ C0] CPU: 0 PID: 2991 Comm: klogd Not tainted 6.1.79-syzkaller #0 [ 592.508802][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 592.508810][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x60 [ 592.508833][ C0] Code: 00 0f 0b 0f 1f 00 53 48 89 fb e8 17 00 00 00 48 8b 3d 78 c9 e8 0c 48 89 de 5b e9 87 99 56 00 cc cc cc cc cc cc cc 48 8b 04 24 <65> 48 8b 0d 44 f0 77 7e 65 8b 15 45 f0 77 7e f7 c2 00 01 ff 00 74 [ 592.508844][ C0] RSP: 0018:ffffc9000317fc78 EFLAGS: 00000246 [ 592.508857][ C0] RAX: ffffffff84369b65 RBX: ffffc9000317fdd0 RCX: ffff88807ccb1dc0 [ 592.508868][ C0] RDX: ffff88807ccb1dc0 RSI: 0000000000000001 RDI: 0000000000000002 [ 592.508877][ C0] RBP: ffffc9000317fe58 R08: ffffffff84369b56 R09: ffffc9000317fe50 [ 592.508887][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000558ab2d4c810 [ 592.508896][ C0] R13: dffffc0000000000 R14: 000000000000004e R15: 0000000000000001 [ 592.508905][ C0] FS: 00007f9b3eed5380(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 592.508917][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 592.508927][ C0] CR2: 0000555555757938 CR3: 0000000027ee2000 CR4: 00000000003506f0 [ 592.508940][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 592.508947][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 592.508956][ C0] Call Trace: [ 592.508960][ C0] [ 592.508965][ C0] ? nmi_cpu_backtrace+0x3de/0x560 [ 592.508985][ C0] ? read_lock_is_recursive+0x10/0x10 [ 592.509005][ C0] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 592.509024][ C0] ? nmi_handle+0x25/0x440 [ 592.509128][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 592.509146][ C0] ? nmi_handle+0x12e/0x440 [ 592.509164][ C0] ? nmi_handle+0x25/0x440 [ 592.509182][ C0] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 592.509197][ C0] ? default_do_nmi+0x62/0x150 [ 592.509211][ C0] ? exc_nmi+0xab/0x120 [ 592.509224][ C0] ? end_repeat_nmi+0x16/0x31 [ 592.509246][ C0] ? import_single_range+0x106/0x2c0 [ 592.509292][ C0] ? import_single_range+0x115/0x2c0 [ 592.509309][ C0] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 592.509325][ C0] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 592.509341][ C0] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 592.509357][ C0] [ 592.509361][ C0] [ 592.509365][ C0] import_single_range+0x115/0x2c0 [ 592.509384][ C0] __sys_sendto+0x100/0x600 [ 592.509405][ C0] ? __ia32_sys_getpeername+0x80/0x80 [ 592.509437][ C0] ? print_irqtrace_events+0x210/0x210 [ 592.509458][ C0] __x64_sys_sendto+0xda/0xf0 [ 592.509477][ C0] do_syscall_64+0x3d/0xb0 [ 592.509495][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 592.509513][ C0] RIP: 0033:0x7f9b3f0379b5 [ 592.509524][ C0] Code: 8b 44 24 08 48 83 c4 28 48 98 c3 48 98 c3 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 26 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 7a 48 8b 15 44 c4 0c 00 f7 d8 64 89 02 48 83 [ 592.509534][ C0] RSP: 002b:00007fff9eda2f38 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 592.509548][ C0] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f9b3f0379b5 [ 592.509557][ C0] RDX: 000000000000004e RSI: 0000558ab2d4c810 RDI: 0000000000000003 [ 592.509566][ C0] RBP: 0000558ab2d47910 R08: 0000000000000000 R09: 0000000000000000 [ 592.509574][ C0] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000013 [ 592.509582][ C0] R13: 00007f9b3f1c5212 R14: 00007fff9eda3038 R15: 0000000000000000 [ 592.509599][ C0] 06:34:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001f40)=""/253, 0xfd}, {&(0x7f0000002040)=""/78, 0x4e}], 0x2, &(0x7f0000002100)=[@cred={{0x1c}}], 0x20}, 0x10042) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 593.156791][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 593.163689][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.79-syzkaller #0 [ 593.171519][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 593.181596][ T28] Call Trace: [ 593.184888][ T28] [ 593.187925][ T28] dump_stack_lvl+0x1e3/0x2cb [ 593.192652][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 593.198144][ T28] ? panic+0x75d/0x75d [ 593.202230][ T28] ? llist_add_batch+0x160/0x1d0 [ 593.207193][ T28] ? vscnprintf+0x59/0x80 [ 593.211545][ T28] panic+0x318/0x75d [ 593.215458][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 593.221640][ T28] ? memcpy_page_flushcache+0xfc/0xfc [ 593.227040][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 593.233218][ T28] ? nmi_trigger_cpumask_backtrace+0x33a/0x3f0 [ 593.239413][ T28] ? nmi_trigger_cpumask_backtrace+0x33f/0x3f0 [ 593.245593][ T28] watchdog+0xfc7/0xfd0 [ 593.249774][ T28] ? watchdog+0x1f8/0xfd0 [ 593.254130][ T28] kthread+0x28d/0x320 [ 593.258217][ T28] ? hungtask_pm_notify+0x50/0x50 [ 593.263256][ T28] ? kthread_blkcg+0xd0/0xd0 [ 593.267872][ T28] ret_from_fork+0x1f/0x30 [ 593.272318][ T28] [ 593.275530][ T28] Kernel Offset: disabled [ 593.279940][ T28] Rebooting in 86400 seconds..