ock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 06:30:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 380.065472][ T8311] netdevsim netdevsim2 netdevsim2: renamed from eth2 06:30:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 380.272070][ T8311] netdevsim netdevsim2 netdevsim3: renamed from eth3 06:30:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:49 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:51 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:52 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 384.123546][ T8307] netdevsim netdevsim4 netdevsim0: renamed from eth0 06:30:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 384.660469][ T8307] netdevsim netdevsim4 netdevsim1: renamed from eth1 06:30:53 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) 06:30:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:30:57 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:57 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:57 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:58 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:30:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r7, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r8, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 389.810255][ T8307] netdevsim netdevsim4 netdevsim2: renamed from eth2 06:30:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) [ 390.150337][ T8307] netdevsim netdevsim4 netdevsim3: renamed from eth3 06:30:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:30:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:31:00 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:31:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) 06:31:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r7, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r8, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000, 0xa784}) 06:31:02 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000, 0xa784}) 06:31:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000, 0xa784}) [ 394.468930][ T8311] 8021q: adding VLAN 0 to HW filter on device bond0 06:31:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000, 0xa784}) 06:31:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r7, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r8, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 394.532134][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.547737][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.560174][ T8311] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.610926][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.628407][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.647250][ T3634] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.654397][ T3634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.716979][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.725800][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.777439][ T3634] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.784576][ T3634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.821323][ T8307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.862847][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.928921][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 394.948017][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 394.980804][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 395.013217][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:31:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000, 0xa784}) [ 395.047580][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 395.087322][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 395.098799][ T8307] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.158206][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 395.187417][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 395.196322][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.237696][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.246270][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.297756][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 395.306353][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.347966][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.382316][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.397218][ T3636] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.404348][ T3636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.433871][ T8311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 06:31:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000, 0xa784}) [ 395.450280][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 395.475925][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 06:31:04 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 395.508243][ T3634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.527425][ T3634] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.534548][ T3634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.585634][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 395.608973][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 395.657439][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 395.680037][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 395.710881][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 395.745535][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.770094][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.809878][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 06:31:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:05 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:05 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000}) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 398.213917][ T8307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 398.236321][ T8307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 398.257150][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 398.265436][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 398.319782][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000}) [ 398.524571][ T8311] 8021q: adding VLAN 0 to HW filter on device batadv0 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000}) [ 398.599314][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 398.611705][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x10000}) [ 398.667037][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 398.675819][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 398.726833][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 398.735347][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 398.769107][ T8311] device veth0_vlan entered promiscuous mode [ 398.781303][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.807892][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.837778][ T8311] device veth1_vlan entered promiscuous mode 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 398.884394][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 398.907761][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 06:31:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 398.927478][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 398.941411][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 398.971962][ T8311] device veth0_macvtap entered promiscuous mode [ 398.996273][ T8311] device veth1_macvtap entered promiscuous mode [ 399.043188][ T8307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 399.073198][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 399.084846][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 06:31:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.109810][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 399.127098][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 399.153224][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.188530][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 06:31:08 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.216285][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.256916][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 06:31:08 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:08 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.306844][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.336852][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 399.386819][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.407094][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 399.427367][ T8311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 399.467215][ T8311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 399.498453][ T8311] batman_adv: batadv0: Interface activated: batadv_slave_0 06:31:08 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) [ 399.513725][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 399.539544][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2}) 06:31:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2}) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2}) 06:31:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:10 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r5, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r8, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r6, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r7) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r9, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 06:31:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:12 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:12 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:12 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:12 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r5, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r8, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r6, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r7) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r9, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:13 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:31:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r5, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r8, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r6, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r7) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r9, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 06:31:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 06:31:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 06:31:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 06:31:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 06:31:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:17 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 409.058297][ T3570] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 409.067685][ T3570] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 409.075614][ T3570] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 409.084164][ T3570] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 409.091972][ T3570] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 409.100110][ T3570] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 409.181890][ T48] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 409.191723][ T48] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 409.201063][ T48] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 409.209287][ T48] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 409.220125][ T48] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 06:31:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 409.227956][ T48] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 06:31:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 411.189774][ T3558] Bluetooth: hci1: command 0x0409 tx timeout [ 411.266956][ T3558] Bluetooth: hci2: command 0x0409 tx timeout 06:31:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) 06:31:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:20 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:22 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 413.266967][ T3558] Bluetooth: hci1: command 0x041b tx timeout [ 413.346908][ T48] Bluetooth: hci2: command 0x041b tx timeout 06:31:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:23 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 415.353291][ T48] Bluetooth: hci1: command 0x040f tx timeout 06:31:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 415.426987][ T48] Bluetooth: hci2: command 0x040f tx timeout [ 415.528397][ T9273] chnl_net:caif_netlink_parms(): no params data found 06:31:25 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:31:26 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 417.426960][ T48] Bluetooth: hci1: command 0x0419 tx timeout 06:31:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, 0xffffffffffffffff], 0x3) [ 417.507094][ T48] Bluetooth: hci2: command 0x0419 tx timeout 06:31:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:27 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) 06:31:29 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 420.380360][ T9270] chnl_net:caif_netlink_parms(): no params data found 06:31:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) 06:31:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:30 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) 06:31:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r3 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff], 0x3) [ 422.760186][ T9273] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.767373][ T9273] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.801400][ T9273] device bridge_slave_0 entered promiscuous mode [ 422.892090][ T9273] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.899549][ T9273] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:31 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 422.967527][ T9273] device bridge_slave_1 entered promiscuous mode 06:31:33 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:33 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:34 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:35 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:35 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:36 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:36 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:38 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:38 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:39 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 430.260301][ T9273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 06:31:39 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:40 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 431.827162][ T3558] Bluetooth: hci5: command 0x0406 tx timeout [ 431.833233][ T3558] Bluetooth: hci6: command 0x0406 tx timeout 06:31:40 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:41 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 433.021022][ T11] device hsr_slave_0 left promiscuous mode 06:31:42 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:42 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:42 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 434.057373][ T11] device hsr_slave_1 left promiscuous mode 06:31:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:43 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:43 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 434.902133][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 434.914686][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 435.194541][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 435.216868][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:44 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 435.426472][ T11] device bridge_slave_1 left promiscuous mode [ 435.456338][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:45 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 436.134984][ T11] device bridge_slave_0 left promiscuous mode [ 436.147636][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:46 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:46 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 437.878394][ T11] device hsr_slave_0 left promiscuous mode 06:31:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:47 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 438.242320][ T11] device hsr_slave_1 left promiscuous mode 06:31:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:48 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 439.021076][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 439.047666][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 439.278394][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 439.285875][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:48 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:48 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 439.793519][ T11] device bridge_slave_1 left promiscuous mode [ 439.807072][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:48 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 439.988551][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.994864][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 440.397467][ T11] device bridge_slave_0 left promiscuous mode [ 440.403726][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 441.133413][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 441.641485][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:31:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 441.811051][ T11] device bridge_slave_1 left promiscuous mode [ 441.827726][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:50 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:50 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:51 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 442.260115][ T11] device bridge_slave_0 left promiscuous mode [ 442.266430][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:51 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:51 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) [ 442.612116][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:51 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 442.703244][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:51 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 443.022338][ T11] device bridge_slave_1 left promiscuous mode [ 443.039172][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0, 0xffffffffffffffff], 0x2) 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0, 0xffffffffffffffff], 0x2) 06:31:52 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0, 0xffffffffffffffff], 0x2) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:31:52 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 443.957902][ T11] device bridge_slave_0 left promiscuous mode [ 443.964192][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:53 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:53 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:53 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 444.897977][ T11] device hsr_slave_0 left promiscuous mode 06:31:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 445.702697][ T11] device hsr_slave_1 left promiscuous mode 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:55 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:31:55 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 446.217487][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 446.442941][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:55 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:55 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) [ 446.890353][ T11] device bridge_slave_1 left promiscuous mode [ 446.896641][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:31:56 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:31:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) 06:31:56 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:31:56 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) [ 447.887820][ T11] device bridge_slave_0 left promiscuous mode [ 447.894084][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:57 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:31:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:57 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") [ 448.324851][ T11] device hsr_slave_0 left promiscuous mode 06:31:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 448.383158][ T11] device hsr_slave_1 left promiscuous mode [ 448.390821][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 448.439282][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 448.486423][ T11] device bridge_slave_1 left promiscuous mode [ 448.493085][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:31:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 449.301701][ T11] device bridge_slave_0 left promiscuous mode [ 449.308178][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:31:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:31:59 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) 06:32:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:00 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:32:00 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) [ 451.889792][ T11] device hsr_slave_0 left promiscuous mode 06:32:01 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:01 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) 06:32:01 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:02 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:02 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 453.497260][ T11] device hsr_slave_1 left promiscuous mode 06:32:02 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:03 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) 06:32:03 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:03 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:03 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) [ 455.139285][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 455.755249][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 06:32:04 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:05 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 456.189772][ T11] device bridge_slave_1 left promiscuous mode [ 456.196002][ T11] bridge0: port 2(bridge_slave_1) entered disabled state 06:32:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:05 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 457.047506][ T11] device bridge_slave_0 left promiscuous mode [ 457.053833][ T11] bridge0: port 1(bridge_slave_0) entered disabled state 06:32:06 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:06 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:06 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:07 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:07 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 06:32:07 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:07 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:07 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:08 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:08 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:08 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:08 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:08 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:08 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) 06:32:09 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) [ 460.157226][ T11] device veth1_macvtap left promiscuous mode [ 460.163340][ T11] device veth0_macvtap left promiscuous mode [ 460.190785][ T11] device veth1_vlan left promiscuous mode [ 460.196671][ T11] device veth0_vlan left promiscuous mode 06:32:09 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:09 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 06:32:09 executing program 1: r0 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:10 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:10 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:10 executing program 1: syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:32:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r0, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:11 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a") [ 462.197250][ T11] device veth1_macvtap left promiscuous mode [ 462.204060][ T11] device veth0_macvtap left promiscuous mode [ 462.229148][ T11] device veth1_vlan left promiscuous mode [ 462.235123][ T11] device veth0_vlan left promiscuous mode 06:32:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:12 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a") 06:32:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:32:14 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a") 06:32:14 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 06:32:15 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) 06:32:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:16 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:16 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970") 06:32:16 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:16 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:17 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:17 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970") 06:32:17 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:18 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:18 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:19 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:32:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970") 06:32:19 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:32:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:20 executing program 1: r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:32:20 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:20 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609") 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:22 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609") 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 475.381837][ T3558] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 475.390974][ T3558] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 475.399367][ T3570] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 475.408155][ T3558] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 475.415787][ T3558] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 475.423525][ T3558] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 475.490909][ T48] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 475.500225][ T48] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 475.508398][ T48] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 475.516361][ T48] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 475.524732][ T48] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 475.532056][ T48] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609") 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 06:32:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0], 0x2) 06:32:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 06:32:26 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[r0], 0x1) [ 477.507387][ T3558] Bluetooth: hci3: command 0x0409 tx timeout 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) [ 477.587008][ T3558] Bluetooth: hci4: command 0x0409 tx timeout 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r0 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000640)=[0xffffffffffffffff], 0x1) 06:32:26 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be6036") 06:32:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:28 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be6036") [ 479.586887][ T3558] Bluetooth: hci3: command 0x041b tx timeout [ 479.667228][ T3558] Bluetooth: hci4: command 0x041b tx timeout 06:32:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:29 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be6036") 06:32:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) [ 481.666948][ T3558] Bluetooth: hci3: command 0x040f tx timeout 06:32:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 481.747210][ T3558] Bluetooth: hci4: command 0x040f tx timeout 06:32:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:31 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c44") 06:32:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 483.747338][ T3558] Bluetooth: hci3: command 0x0419 tx timeout [ 483.826991][ T48] Bluetooth: hci4: command 0x0419 tx timeout 06:32:32 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c44") 06:32:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:33 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:33 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:34 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c44") 06:32:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:35 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:35 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:36 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:37 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625") 06:32:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:39 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625") 06:32:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 06:32:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 06:32:40 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625") 06:32:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:42 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25") 06:32:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x0, 0x0, 0x424f4cd500182e2c}, 0x48) 06:32:43 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:43 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0), 0x48) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0), 0x48) 06:32:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0), 0x48) 06:32:44 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25") 06:32:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:46 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25") 06:32:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:32:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 501.429472][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.435814][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 06:32:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:32:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:32:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:32:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:00 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x4}}, 0x20) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 511.251663][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:00 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:01 executing program 1: accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) [ 512.798420][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:02 executing program 1: accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x80000) 06:33:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:03 executing program 1: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) [ 514.623780][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:03 executing program 1: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:33:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 517.189111][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(0xffffffffffffffff, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r1 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r1}) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 522.558941][ T11] bond0 (unregistering): Released all slaves 06:33:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x0, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 06:33:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:14 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:14 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:33:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:33:16 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:16 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:33:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:17 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:20 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:21 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) 06:33:21 executing program 3: syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 533.583093][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:22 executing program 3: syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 534.227117][ T48] Bluetooth: hci2: command 0x0406 tx timeout [ 534.227126][ T3558] Bluetooth: hci1: command 0x0406 tx timeout [ 534.253300][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:23 executing program 3: syz_io_uring_setup(0x0, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) [ 534.477556][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:24 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) [ 535.707317][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:24 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:25 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:26 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) 06:33:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:26 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:27 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:27 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) 06:33:28 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) 06:33:28 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) [ 539.707560][ T11] bond0 (unregistering): Released all slaves 06:33:29 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:29 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) 06:33:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:29 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, 0x0, &(0x7f0000000580)) 06:33:29 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, 0x0, &(0x7f0000000580)) 06:33:29 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:30 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, 0x0, &(0x7f0000000580)) 06:33:30 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), 0x0) [ 541.799262][ T48] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 541.815659][ T48] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 06:33:30 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), 0x0) [ 541.850794][ T3558] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 541.858665][ T3558] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 541.868881][ T3558] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 541.872834][ T11] team0 (unregistering): Port device team_slave_1 removed [ 541.877236][ T3558] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 541.892757][ T3558] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 541.900929][ T3558] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 541.917077][T10631] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 541.925765][T10631] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 541.935770][ T3570] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 541.943634][ T3570] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 06:33:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:31 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0), &(0x7f0000000540), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:31 executing program 3: syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x11d}, &(0x7f0000000540), 0x0) 06:33:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 542.683934][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c", 0x43, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:32 executing program 1: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) [ 543.400658][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:32 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:32 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) [ 543.987052][ T3570] Bluetooth: hci8: command 0x0409 tx timeout [ 543.993527][ T3570] Bluetooth: hci7: command 0x0409 tx timeout 06:33:33 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:33 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) [ 544.445546][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:33 executing program 3: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:33 executing program 3: syz_io_uring_setup(0x961, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 06:33:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:34 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, 0x0, &(0x7f0000000580)) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) 06:33:34 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) 06:33:34 executing program 3: syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) 06:33:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r3, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), 0xffffffffffffffff, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00)}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 546.067794][ T48] Bluetooth: hci7: command 0x041b tx timeout [ 546.073866][ T48] Bluetooth: hci8: command 0x041b tx timeout 06:33:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:35 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0x0) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8", 0x4e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:36 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) r0 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r1 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 06:33:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 548.157123][ T48] Bluetooth: hci8: command 0x040f tx timeout [ 548.163229][ T48] Bluetooth: hci7: command 0x040f tx timeout 06:33:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:37 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed", 0x2d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:33:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 549.364299][ T11] bond0 (unregistering): Released all slaves 06:33:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, r5], 0x3) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r6, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 550.227149][ T3570] Bluetooth: hci7: command 0x0419 tx timeout [ 550.233218][ T3570] Bluetooth: hci8: command 0x0419 tx timeout 06:33:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817d", 0x54, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:33:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:33:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) [ 552.479048][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r9, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r8) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, 0xffffffffffffffff], 0x3) 06:33:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 553.896168][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 554.597410][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:33:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r2}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) [ 555.949736][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:33:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:47 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15, 0x4}}, 0x20) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:47 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:47 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:48 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:48 executing program 3: io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:49 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:49 executing program 3: io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) 06:33:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 561.917631][ T11] bond0 (unregistering): Released all slaves 06:33:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) [ 562.870001][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.876335][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 06:33:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:52 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97ccee", 0x58, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:53 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:54 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x2, 0x10000}) 06:33:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cc", 0x57, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:33:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:33:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) [ 569.287955][ T11] team0 (unregistering): Port device team_slave_1 removed 06:33:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, 0x0, &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:33:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:33:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)) [ 570.007822][ T11] team0 (unregistering): Port device team_slave_0 removed 06:33:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x15}}, 0x20) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") 06:33:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:33:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:33:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) [ 570.864125][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:34:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:00 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) 06:34:01 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) [ 572.257425][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:34:01 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r10, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:02 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x0, 0xa784}) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), 0x0, &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0x0, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x2, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x0, 0x0, 0xa784}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:34:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:34:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0x6, 0x4, 0x2, 0x1c, 0x18, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2}) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x0, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x0, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x0, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0x0, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) [ 577.247970][ T11] bond0 (unregistering): Released all slaves 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 06:34:06 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x0, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:07 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000}) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, 0x0) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001900)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000018c0), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001900)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000018c0), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:09 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 580.885436][ T11] team0 (unregistering): Port device team_slave_1 removed 06:34:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) [ 581.770653][ T11] team0 (unregistering): Port device team_slave_0 removed 06:34:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) 06:34:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 582.887192][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:34:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 583.667935][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:34:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) [ 584.884513][ T11] bond0 (unregistering): Released all slaves 06:34:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1) 06:34:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r2 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="ed0f2d5a97b5f60aad188dab46a3940405297062e46da8707e06647edbfb45be8504b0872b9e86900cdb9cfac7818d94864fe552456ca67dc3cd8d7d415e3f43ae120ea29d660eb2dbbff400e1cda188413d236795456efba8b3bd0c01a4056caa1e512b86faaa140d56afc12423b2513d59a3c118ab7a05dc804cc544d2ad188178da7c7ad733af4c6c30d9ccc27d9ed2edb8db360c0f6cdbfb33c36edaf6a2a030879b2d51fad704393a6fae1f3a4d2970066e2dd2d881d8bc82a854c16830398c13b4eeda1d8f579c6c400afee609c249a39f0dd87f837546a604be60361ec72879639c4437165625fb25a5") fcntl$lock(r0, 0x25, &(0x7f0000000380)={0x0, 0x0, 0x10000, 0xa784, r2}) pread64(r1, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r1, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', 0x0, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) syz_genetlink_get_family_id$ethtool(&(0x7f00000021c0), 0xffffffffffffffff) 06:34:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x15, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r3 = syz_clone(0x20000300, &(0x7f0000000180)="b2a6943817531b622b68d24f89587679f89a84630ec2b9df6ea4fc2a568532f6cc72a7c458349645b818abeaed99dbdc97821284c186a80036c1da25224573b5f9a17c3966a0888a1f0b2cb7e3b8a02b4d3b817dbf97cceee1", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x2, 0x2, 0x10000, 0xa784, r3}) pread64(r2, &(0x7f00000003c0)=""/75, 0x4b, 0x3) fcntl$lock(r2, 0x23, &(0x7f0000000440)={0x1, 0x0, 0x2, 0x40, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000480), 0x7, 0x840) r5 = syz_io_uring_setup(0x961, &(0x7f00000004c0)={0x0, 0xb6e, 0x8c0, 0x3, 0x11d}, &(0x7f0000000540), &(0x7f0000000580)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x14, 0x0, 0x2, 0x2, 0x424f4cd500182e2c, r2, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000640)=[0xffffffffffffffff, r4, r6], 0x3) r7 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x80000) recvmmsg$unix(r7, &(0x7f0000001680)=[{{&(0x7f0000000740), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/39, 0x27}], 0x2, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/45, 0x2d}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/71, 0x47}, {&(0x7f0000000d00)=""/131, 0x83}, {&(0x7f0000000dc0)=""/239, 0xef}, {&(0x7f0000000ec0)=""/147, 0x93}, {&(0x7f0000000f80)=""/127, 0x7f}], 0x9, &(0x7f00000010c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/119, 0x77}], 0x2, &(0x7f0000001340)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001380), 0x6e, &(0x7f0000001600)=[{&(0x7f0000001400)=""/28, 0x1c}, {&(0x7f0000001440)=""/175, 0xaf}, {&(0x7f0000001500)=""/232, 0xe8}], 0x3, &(0x7f0000001640)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x2100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000017c0)={'gretap0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x7800, 0x10, 0x7ff, 0x3, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x77, 0x29, 0x0, @private=0xa010101, @local, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001880)={'gre0\x00', &(0x7f0000001800)={'gretap0\x00', r10, 0x8000, 0x8, 0xe20, 0x101, {{0xa, 0x4, 0x2, 0x1c, 0x28, 0x64, 0x0, 0x2, 0x4, 0x0, @rand_addr=0x64010100, @multicast2, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0xc6, [@empty, @private=0xa010101, @remote]}]}}}}}) ioctl$SIOCPNDELRESOURCE(r8, 0x89ef, &(0x7f0000001940)=0x7) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001b80)={0x5, 0x10, 0xfa00, {&(0x7f0000001980), r1, 0x1}}, 0x18) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001c00), r9) sendmsg$L2TP_CMD_TUNNEL_GET(r8, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r11, 0x112, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r8, &(0x7f0000001f00)={0x5, 0x10, 0xfa00, {&(0x7f0000001d00), r1}}, 0x18) socket$phonet(0x23, 0x2, 0x1)