Warning: Permanently added '10.128.0.96' (ED25519) to the list of known hosts. 2024/01/12 13:27:35 fuzzer started 2024/01/12 13:27:35 dialing manager at 10.128.0.169:30013 [ 145.985334][ T5006] cgroup: Unknown subsys name 'net' [ 146.116593][ T5006] cgroup: Unknown subsys name 'rlimit' [ 152.472937][ T1211] ieee802154 phy0 wpan0: encryption failed: -22 [ 152.479959][ T1211] ieee802154 phy1 wpan1: encryption failed: -22 2024/01/12 13:28:20 syscalls: 3818 2024/01/12 13:28:20 code coverage: enabled 2024/01/12 13:28:20 comparison tracing: enabled 2024/01/12 13:28:20 extra coverage: enabled 2024/01/12 13:28:20 delay kcov mmap: enabled 2024/01/12 13:28:20 setuid sandbox: enabled 2024/01/12 13:28:20 namespace sandbox: enabled 2024/01/12 13:28:20 Android sandbox: /sys/fs/selinux/policy does not exist 2024/01/12 13:28:20 fault injection: enabled 2024/01/12 13:28:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/01/12 13:28:20 net packet injection: enabled 2024/01/12 13:28:20 net device setup: enabled 2024/01/12 13:28:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/01/12 13:28:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/01/12 13:28:20 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/01/12 13:28:20 USB emulation: enabled 2024/01/12 13:28:20 hci packet injection: enabled 2024/01/12 13:28:20 wifi device emulation: enabled 2024/01/12 13:28:20 802.15.4 emulation: enabled 2024/01/12 13:28:20 swap file: enabled 2024/01/12 13:28:20 fetching corpus: 0, signal 0/2000 (executing program) [ 190.223206][ T5006] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/01/12 13:28:20 fetching corpus: 50, signal 13735/17585 (executing program) 2024/01/12 13:28:21 fetching corpus: 100, signal 25200/30818 (executing program) 2024/01/12 13:28:21 fetching corpus: 150, signal 34842/42131 (executing program) 2024/01/12 13:28:21 fetching corpus: 200, signal 40524/49510 (executing program) 2024/01/12 13:28:21 fetching corpus: 250, signal 45621/56241 (executing program) 2024/01/12 13:28:21 fetching corpus: 300, signal 49008/61255 (executing program) 2024/01/12 13:28:21 fetching corpus: 350, signal 52880/66728 (executing program) 2024/01/12 13:28:21 fetching corpus: 400, signal 55936/71334 (executing program) 2024/01/12 13:28:21 fetching corpus: 450, signal 57703/74733 (executing program) 2024/01/12 13:28:22 fetching corpus: 500, signal 59970/78612 (executing program) 2024/01/12 13:28:22 fetching corpus: 550, signal 62566/82733 (executing program) 2024/01/12 13:28:22 fetching corpus: 600, signal 64820/86508 (executing program) 2024/01/12 13:28:22 fetching corpus: 650, signal 68255/91415 (executing program) 2024/01/12 13:28:22 fetching corpus: 700, signal 70812/95431 (executing program) 2024/01/12 13:28:22 fetching corpus: 750, signal 72786/98883 (executing program) 2024/01/12 13:28:22 fetching corpus: 800, signal 74424/102020 (executing program) 2024/01/12 13:28:22 fetching corpus: 850, signal 76808/105759 (executing program) 2024/01/12 13:28:22 fetching corpus: 900, signal 79412/109716 (executing program) 2024/01/12 13:28:23 fetching corpus: 950, signal 81888/113507 (executing program) 2024/01/12 13:28:23 fetching corpus: 1000, signal 83922/116886 (executing program) 2024/01/12 13:28:23 fetching corpus: 1050, signal 85909/120228 (executing program) 2024/01/12 13:28:23 fetching corpus: 1100, signal 88063/123676 (executing program) 2024/01/12 13:28:23 fetching corpus: 1150, signal 91099/127852 (executing program) 2024/01/12 13:28:23 fetching corpus: 1200, signal 92735/130790 (executing program) 2024/01/12 13:28:23 fetching corpus: 1250, signal 94211/133641 (executing program) 2024/01/12 13:28:23 fetching corpus: 1300, signal 96273/136940 (executing program) 2024/01/12 13:28:23 fetching corpus: 1350, signal 98021/139978 (executing program) 2024/01/12 13:28:24 fetching corpus: 1400, signal 99357/142571 (executing program) 2024/01/12 13:28:24 fetching corpus: 1450, signal 100416/144972 (executing program) 2024/01/12 13:28:24 fetching corpus: 1500, signal 101363/147272 (executing program) 2024/01/12 13:28:24 fetching corpus: 1550, signal 103243/150334 (executing program) 2024/01/12 13:28:24 fetching corpus: 1600, signal 104887/153163 (executing program) 2024/01/12 13:28:24 fetching corpus: 1650, signal 107052/156430 (executing program) 2024/01/12 13:28:24 fetching corpus: 1700, signal 108850/159394 (executing program) 2024/01/12 13:28:24 fetching corpus: 1750, signal 110971/162555 (executing program) 2024/01/12 13:28:25 fetching corpus: 1800, signal 112146/164958 (executing program) 2024/01/12 13:28:25 fetching corpus: 1850, signal 113802/167732 (executing program) 2024/01/12 13:28:25 fetching corpus: 1900, signal 114641/169824 (executing program) 2024/01/12 13:28:25 fetching corpus: 1950, signal 115879/172184 (executing program) 2024/01/12 13:28:25 fetching corpus: 2000, signal 116780/174311 (executing program) 2024/01/12 13:28:25 fetching corpus: 2050, signal 117771/176475 (executing program) 2024/01/12 13:28:25 fetching corpus: 2100, signal 119173/178940 (executing program) 2024/01/12 13:28:26 fetching corpus: 2150, signal 120422/181293 (executing program) 2024/01/12 13:28:26 fetching corpus: 2200, signal 121388/183392 (executing program) 2024/01/12 13:28:26 fetching corpus: 2250, signal 122832/185880 (executing program) 2024/01/12 13:28:26 fetching corpus: 2300, signal 123841/187995 (executing program) 2024/01/12 13:28:26 fetching corpus: 2350, signal 124671/189960 (executing program) 2024/01/12 13:28:26 fetching corpus: 2400, signal 125553/191994 (executing program) 2024/01/12 13:28:26 fetching corpus: 2450, signal 126831/194321 (executing program) 2024/01/12 13:28:26 fetching corpus: 2500, signal 127624/196224 (executing program) 2024/01/12 13:28:27 fetching corpus: 2550, signal 128308/198079 (executing program) 2024/01/12 13:28:27 fetching corpus: 2600, signal 129503/200302 (executing program) 2024/01/12 13:28:27 fetching corpus: 2650, signal 130295/202226 (executing program) 2024/01/12 13:28:27 fetching corpus: 2700, signal 131577/204466 (executing program) 2024/01/12 13:28:27 fetching corpus: 2750, signal 132377/206387 (executing program) 2024/01/12 13:28:27 fetching corpus: 2800, signal 133449/208494 (executing program) 2024/01/12 13:28:27 fetching corpus: 2850, signal 134397/210452 (executing program) 2024/01/12 13:28:27 fetching corpus: 2900, signal 135339/212418 (executing program) 2024/01/12 13:28:27 fetching corpus: 2950, signal 136518/214526 (executing program) 2024/01/12 13:28:28 fetching corpus: 3000, signal 137531/216555 (executing program) 2024/01/12 13:28:28 fetching corpus: 3050, signal 138054/218231 (executing program) 2024/01/12 13:28:28 fetching corpus: 3100, signal 138696/219962 (executing program) 2024/01/12 13:28:28 fetching corpus: 3150, signal 139518/221823 (executing program) 2024/01/12 13:28:28 fetching corpus: 3200, signal 140295/223574 (executing program) 2024/01/12 13:28:28 fetching corpus: 3250, signal 141376/225601 (executing program) 2024/01/12 13:28:28 fetching corpus: 3300, signal 142124/227408 (executing program) 2024/01/12 13:28:28 fetching corpus: 3350, signal 142828/229111 (executing program) 2024/01/12 13:28:29 fetching corpus: 3400, signal 143514/230866 (executing program) 2024/01/12 13:28:29 fetching corpus: 3450, signal 144060/232531 (executing program) 2024/01/12 13:28:29 fetching corpus: 3500, signal 144817/234291 (executing program) 2024/01/12 13:28:29 fetching corpus: 3550, signal 145505/236006 (executing program) 2024/01/12 13:28:29 fetching corpus: 3600, signal 146632/237962 (executing program) 2024/01/12 13:28:29 fetching corpus: 3650, signal 147692/239874 (executing program) 2024/01/12 13:28:29 fetching corpus: 3700, signal 148776/241800 (executing program) 2024/01/12 13:28:29 fetching corpus: 3750, signal 149550/243509 (executing program) 2024/01/12 13:28:30 fetching corpus: 3800, signal 150636/245429 (executing program) 2024/01/12 13:28:30 fetching corpus: 3850, signal 151487/247121 (executing program) 2024/01/12 13:28:30 fetching corpus: 3900, signal 152523/248942 (executing program) 2024/01/12 13:28:30 fetching corpus: 3950, signal 153173/250543 (executing program) 2024/01/12 13:28:30 fetching corpus: 4000, signal 153815/252168 (executing program) 2024/01/12 13:28:30 fetching corpus: 4050, signal 154649/253885 (executing program) 2024/01/12 13:28:30 fetching corpus: 4100, signal 155349/255539 (executing program) 2024/01/12 13:28:30 fetching corpus: 4150, signal 155950/257072 (executing program) 2024/01/12 13:28:30 fetching corpus: 4200, signal 156541/258664 (executing program) 2024/01/12 13:28:30 fetching corpus: 4250, signal 157163/260158 (executing program) 2024/01/12 13:28:31 fetching corpus: 4300, signal 157814/261693 (executing program) 2024/01/12 13:28:31 fetching corpus: 4350, signal 158665/263358 (executing program) 2024/01/12 13:28:31 fetching corpus: 4400, signal 159517/265006 (executing program) 2024/01/12 13:28:31 fetching corpus: 4450, signal 160094/266465 (executing program) 2024/01/12 13:28:31 fetching corpus: 4500, signal 160739/267980 (executing program) 2024/01/12 13:28:31 fetching corpus: 4550, signal 161217/269421 (executing program) 2024/01/12 13:28:31 fetching corpus: 4600, signal 161977/270960 (executing program) 2024/01/12 13:28:31 fetching corpus: 4650, signal 162849/272616 (executing program) 2024/01/12 13:28:31 fetching corpus: 4700, signal 163559/274174 (executing program) 2024/01/12 13:28:31 fetching corpus: 4750, signal 164247/275652 (executing program) 2024/01/12 13:28:32 fetching corpus: 4800, signal 164939/277177 (executing program) 2024/01/12 13:28:32 fetching corpus: 4850, signal 165281/278471 (executing program) 2024/01/12 13:28:32 fetching corpus: 4900, signal 165727/279862 (executing program) 2024/01/12 13:28:32 fetching corpus: 4950, signal 166534/281398 (executing program) 2024/01/12 13:28:32 fetching corpus: 5000, signal 167173/282871 (executing program) 2024/01/12 13:28:32 fetching corpus: 5050, signal 167824/284284 (executing program) 2024/01/12 13:28:32 fetching corpus: 5100, signal 169021/286051 (executing program) 2024/01/12 13:28:32 fetching corpus: 5150, signal 169770/287519 (executing program) 2024/01/12 13:28:33 fetching corpus: 5200, signal 170608/289043 (executing program) 2024/01/12 13:28:33 fetching corpus: 5250, signal 171157/290356 (executing program) 2024/01/12 13:28:33 fetching corpus: 5300, signal 171891/291790 (executing program) 2024/01/12 13:28:33 fetching corpus: 5350, signal 172381/293126 (executing program) 2024/01/12 13:28:33 fetching corpus: 5400, signal 172873/294469 (executing program) 2024/01/12 13:28:33 fetching corpus: 5450, signal 173341/295820 (executing program) 2024/01/12 13:28:33 fetching corpus: 5500, signal 174135/297285 (executing program) 2024/01/12 13:28:33 fetching corpus: 5550, signal 174526/298560 (executing program) 2024/01/12 13:28:34 fetching corpus: 5600, signal 175674/300122 (executing program) 2024/01/12 13:28:34 fetching corpus: 5650, signal 176103/301402 (executing program) 2024/01/12 13:28:34 fetching corpus: 5700, signal 176968/302865 (executing program) 2024/01/12 13:28:34 fetching corpus: 5750, signal 177589/304171 (executing program) 2024/01/12 13:28:34 fetching corpus: 5800, signal 178104/305483 (executing program) 2024/01/12 13:28:34 fetching corpus: 5850, signal 178581/306742 (executing program) 2024/01/12 13:28:34 fetching corpus: 5900, signal 179330/308137 (executing program) 2024/01/12 13:28:34 fetching corpus: 5950, signal 179809/309404 (executing program) 2024/01/12 13:28:35 fetching corpus: 6000, signal 180630/310807 (executing program) 2024/01/12 13:28:35 fetching corpus: 6050, signal 181266/312140 (executing program) 2024/01/12 13:28:35 fetching corpus: 6100, signal 181745/313431 (executing program) 2024/01/12 13:28:35 fetching corpus: 6150, signal 182154/314636 (executing program) 2024/01/12 13:28:35 fetching corpus: 6200, signal 182642/315911 (executing program) 2024/01/12 13:28:35 fetching corpus: 6250, signal 183179/317205 (executing program) 2024/01/12 13:28:35 fetching corpus: 6300, signal 183839/318530 (executing program) 2024/01/12 13:28:35 fetching corpus: 6350, signal 184636/319869 (executing program) 2024/01/12 13:28:36 fetching corpus: 6400, signal 185239/321110 (executing program) 2024/01/12 13:28:36 fetching corpus: 6450, signal 185905/322390 (executing program) 2024/01/12 13:28:36 fetching corpus: 6500, signal 186397/323565 (executing program) 2024/01/12 13:28:36 fetching corpus: 6550, signal 186859/324779 (executing program) 2024/01/12 13:28:36 fetching corpus: 6600, signal 187351/326002 (executing program) 2024/01/12 13:28:36 fetching corpus: 6650, signal 188058/327234 (executing program) 2024/01/12 13:28:37 fetching corpus: 6700, signal 188514/328402 (executing program) 2024/01/12 13:28:37 fetching corpus: 6750, signal 189220/329675 (executing program) 2024/01/12 13:28:37 fetching corpus: 6800, signal 189864/330917 (executing program) 2024/01/12 13:28:37 fetching corpus: 6850, signal 190276/332072 (executing program) 2024/01/12 13:28:37 fetching corpus: 6900, signal 191081/333304 (executing program) 2024/01/12 13:28:37 fetching corpus: 6950, signal 191516/334449 (executing program) 2024/01/12 13:28:38 fetching corpus: 7000, signal 191961/335604 (executing program) 2024/01/12 13:28:38 fetching corpus: 7050, signal 192507/336805 (executing program) 2024/01/12 13:28:38 fetching corpus: 7100, signal 193090/337966 (executing program) 2024/01/12 13:28:38 fetching corpus: 7150, signal 193418/339114 (executing program) 2024/01/12 13:28:38 fetching corpus: 7200, signal 193932/340266 (executing program) 2024/01/12 13:28:38 fetching corpus: 7250, signal 194289/341361 (executing program) 2024/01/12 13:28:38 fetching corpus: 7300, signal 194567/342426 (executing program) 2024/01/12 13:28:38 fetching corpus: 7350, signal 194999/343532 (executing program) 2024/01/12 13:28:38 fetching corpus: 7400, signal 195354/344600 (executing program) 2024/01/12 13:28:38 fetching corpus: 7450, signal 195711/345672 (executing program) 2024/01/12 13:28:39 fetching corpus: 7500, signal 196225/346770 (executing program) 2024/01/12 13:28:39 fetching corpus: 7550, signal 196631/347861 (executing program) 2024/01/12 13:28:39 fetching corpus: 7600, signal 197082/349006 (executing program) 2024/01/12 13:28:39 fetching corpus: 7650, signal 197523/350113 (executing program) 2024/01/12 13:28:39 fetching corpus: 7700, signal 197878/351214 (executing program) 2024/01/12 13:28:39 fetching corpus: 7750, signal 198415/352319 (executing program) 2024/01/12 13:28:39 fetching corpus: 7800, signal 198829/353405 (executing program) 2024/01/12 13:28:39 fetching corpus: 7850, signal 199204/354451 (executing program) 2024/01/12 13:28:39 fetching corpus: 7900, signal 199576/355487 (executing program) 2024/01/12 13:28:39 fetching corpus: 7950, signal 200043/356571 (executing program) 2024/01/12 13:28:40 fetching corpus: 8000, signal 200374/357600 (executing program) 2024/01/12 13:28:40 fetching corpus: 8050, signal 201026/358746 (executing program) 2024/01/12 13:28:40 fetching corpus: 8100, signal 201554/359831 (executing program) 2024/01/12 13:28:40 fetching corpus: 8150, signal 202250/360881 (executing program) 2024/01/12 13:28:40 fetching corpus: 8200, signal 202661/361927 (executing program) 2024/01/12 13:28:40 fetching corpus: 8250, signal 202955/362962 (executing program) 2024/01/12 13:28:40 fetching corpus: 8300, signal 203457/364013 (executing program) 2024/01/12 13:28:40 fetching corpus: 8350, signal 203982/365028 (executing program) 2024/01/12 13:28:40 fetching corpus: 8400, signal 204493/366061 (executing program) 2024/01/12 13:28:41 fetching corpus: 8450, signal 204980/367105 (executing program) 2024/01/12 13:28:41 fetching corpus: 8500, signal 205362/368104 (executing program) 2024/01/12 13:28:41 fetching corpus: 8550, signal 205706/369130 (executing program) 2024/01/12 13:28:41 fetching corpus: 8600, signal 206084/370120 (executing program) 2024/01/12 13:28:41 fetching corpus: 8650, signal 206611/371161 (executing program) 2024/01/12 13:28:41 fetching corpus: 8700, signal 206988/372163 (executing program) 2024/01/12 13:28:41 fetching corpus: 8750, signal 207406/373140 (executing program) 2024/01/12 13:28:41 fetching corpus: 8800, signal 207794/374121 (executing program) 2024/01/12 13:28:41 fetching corpus: 8850, signal 208220/375106 (executing program) 2024/01/12 13:28:41 fetching corpus: 8900, signal 208768/376093 (executing program) 2024/01/12 13:28:42 fetching corpus: 8950, signal 209175/377033 (executing program) 2024/01/12 13:28:42 fetching corpus: 9000, signal 209633/378001 (executing program) 2024/01/12 13:28:42 fetching corpus: 9050, signal 210030/378962 (executing program) 2024/01/12 13:28:42 fetching corpus: 9100, signal 211113/379967 (executing program) 2024/01/12 13:28:42 fetching corpus: 9150, signal 211535/380946 (executing program) 2024/01/12 13:28:42 fetching corpus: 9200, signal 213064/381944 (executing program) 2024/01/12 13:28:42 fetching corpus: 9250, signal 213488/382878 (executing program) 2024/01/12 13:28:42 fetching corpus: 9300, signal 213849/383817 (executing program) 2024/01/12 13:28:42 fetching corpus: 9350, signal 214356/384748 (executing program) 2024/01/12 13:28:43 fetching corpus: 9400, signal 214787/385638 (executing program) 2024/01/12 13:28:43 fetching corpus: 9450, signal 215124/386530 (executing program) 2024/01/12 13:28:43 fetching corpus: 9500, signal 215499/387478 (executing program) 2024/01/12 13:28:43 fetching corpus: 9550, signal 216003/388378 (executing program) 2024/01/12 13:28:43 fetching corpus: 9600, signal 216545/389267 (executing program) 2024/01/12 13:28:43 fetching corpus: 9650, signal 216993/390143 (executing program) 2024/01/12 13:28:43 fetching corpus: 9700, signal 217367/391014 (executing program) 2024/01/12 13:28:43 fetching corpus: 9750, signal 217954/391862 (executing program) 2024/01/12 13:28:43 fetching corpus: 9800, signal 218347/391862 (executing program) 2024/01/12 13:28:43 fetching corpus: 9850, signal 218775/391862 (executing program) 2024/01/12 13:28:44 fetching corpus: 9900, signal 219049/391862 (executing program) 2024/01/12 13:28:44 fetching corpus: 9950, signal 219475/391862 (executing program) 2024/01/12 13:28:44 fetching corpus: 10000, signal 219848/391862 (executing program) 2024/01/12 13:28:44 fetching corpus: 10050, signal 220343/391862 (executing program) [ 213.925666][ T1211] ieee802154 phy0 wpan0: encryption failed: -22 [ 213.932470][ T1211] ieee802154 phy1 wpan1: encryption failed: -22 2024/01/12 13:28:44 fetching corpus: 10100, signal 220685/391862 (executing program) 2024/01/12 13:28:44 fetching corpus: 10150, signal 221112/391862 (executing program) 2024/01/12 13:28:44 fetching corpus: 10200, signal 221755/391863 (executing program) 2024/01/12 13:28:44 fetching corpus: 10250, signal 222333/391863 (executing program) 2024/01/12 13:28:44 fetching corpus: 10300, signal 222876/391863 (executing program) 2024/01/12 13:28:45 fetching corpus: 10350, signal 223114/391863 (executing program) 2024/01/12 13:28:45 fetching corpus: 10400, signal 223464/391863 (executing program) 2024/01/12 13:28:45 fetching corpus: 10450, signal 223755/391863 (executing program) 2024/01/12 13:28:45 fetching corpus: 10500, signal 224107/391864 (executing program) 2024/01/12 13:28:45 fetching corpus: 10550, signal 224483/391864 (executing program) 2024/01/12 13:28:45 fetching corpus: 10600, signal 224854/391864 (executing program) 2024/01/12 13:28:45 fetching corpus: 10650, signal 225301/391864 (executing program) 2024/01/12 13:28:45 fetching corpus: 10700, signal 225607/391864 (executing program) 2024/01/12 13:28:45 fetching corpus: 10750, signal 225884/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 10800, signal 226219/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 10850, signal 226610/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 10900, signal 226945/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 10950, signal 227347/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 11000, signal 227831/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 11050, signal 228142/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 11100, signal 228624/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 11150, signal 229085/391864 (executing program) 2024/01/12 13:28:46 fetching corpus: 11200, signal 229434/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11250, signal 229730/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11300, signal 230035/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11350, signal 230345/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11400, signal 230699/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11450, signal 231053/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11500, signal 231323/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11550, signal 231699/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11600, signal 232109/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11650, signal 232489/391864 (executing program) 2024/01/12 13:28:47 fetching corpus: 11700, signal 232853/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 11750, signal 233190/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 11800, signal 233423/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 11850, signal 233770/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 11900, signal 234135/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 11950, signal 234473/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 12000, signal 235003/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 12050, signal 235448/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 12100, signal 235805/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 12150, signal 236128/391864 (executing program) 2024/01/12 13:28:48 fetching corpus: 12200, signal 236360/391864 (executing program) 2024/01/12 13:28:49 fetching corpus: 12250, signal 236679/391864 (executing program) 2024/01/12 13:28:49 fetching corpus: 12300, signal 236984/391864 (executing program) 2024/01/12 13:28:49 fetching corpus: 12350, signal 237424/391864 (executing program) 2024/01/12 13:28:49 fetching corpus: 12400, signal 237763/391865 (executing program) 2024/01/12 13:28:49 fetching corpus: 12450, signal 238172/391865 (executing program) 2024/01/12 13:28:49 fetching corpus: 12500, signal 238474/391865 (executing program) 2024/01/12 13:28:49 fetching corpus: 12550, signal 238923/391865 (executing program) 2024/01/12 13:28:49 fetching corpus: 12600, signal 239353/391865 (executing program) 2024/01/12 13:28:50 fetching corpus: 12650, signal 239861/391865 (executing program) 2024/01/12 13:28:50 fetching corpus: 12700, signal 240289/391865 (executing program) 2024/01/12 13:28:50 fetching corpus: 12750, signal 240718/391865 (executing program) 2024/01/12 13:28:50 fetching corpus: 12800, signal 241081/391865 (executing program) 2024/01/12 13:28:50 fetching corpus: 12850, signal 241403/391865 (executing program) 2024/01/12 13:28:50 fetching corpus: 12900, signal 241671/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 12950, signal 241989/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13000, signal 242362/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13050, signal 242705/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13100, signal 242913/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13150, signal 243249/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13200, signal 243581/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13250, signal 244014/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13300, signal 244278/391865 (executing program) 2024/01/12 13:28:51 fetching corpus: 13350, signal 244520/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13400, signal 244845/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13450, signal 245164/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13500, signal 245434/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13550, signal 245754/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13600, signal 246040/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13650, signal 246236/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13700, signal 246541/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13750, signal 246839/391865 (executing program) 2024/01/12 13:28:52 fetching corpus: 13800, signal 247040/391865 (executing program) 2024/01/12 13:28:53 fetching corpus: 13850, signal 247933/391865 (executing program) 2024/01/12 13:28:53 fetching corpus: 13900, signal 248195/391865 (executing program) 2024/01/12 13:28:53 fetching corpus: 13950, signal 248443/391869 (executing program) 2024/01/12 13:28:53 fetching corpus: 14000, signal 248777/391869 (executing program) 2024/01/12 13:28:53 fetching corpus: 14050, signal 249054/391869 (executing program) 2024/01/12 13:28:53 fetching corpus: 14100, signal 249473/391869 (executing program) 2024/01/12 13:28:53 fetching corpus: 14150, signal 249804/391869 (executing program) 2024/01/12 13:28:53 fetching corpus: 14200, signal 250216/391869 (executing program) 2024/01/12 13:28:53 fetching corpus: 14250, signal 250551/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14300, signal 251009/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14350, signal 251308/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14400, signal 251783/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14450, signal 252211/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14500, signal 252506/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14550, signal 252765/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14600, signal 253203/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14650, signal 253441/391869 (executing program) 2024/01/12 13:28:54 fetching corpus: 14700, signal 253774/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 14750, signal 254090/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 14800, signal 254471/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 14850, signal 254687/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 14900, signal 254960/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 14950, signal 255272/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 15000, signal 255625/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 15050, signal 255845/391869 (executing program) 2024/01/12 13:28:55 fetching corpus: 15100, signal 256430/391869 (executing program) 2024/01/12 13:28:56 fetching corpus: 15150, signal 256700/391869 (executing program) 2024/01/12 13:28:56 fetching corpus: 15200, signal 257103/391871 (executing program) 2024/01/12 13:28:56 fetching corpus: 15250, signal 257424/391871 (executing program) 2024/01/12 13:28:56 fetching corpus: 15300, signal 257766/391871 (executing program) 2024/01/12 13:28:56 fetching corpus: 15350, signal 258193/391871 (executing program) 2024/01/12 13:28:56 fetching corpus: 15400, signal 258503/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15450, signal 258844/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15500, signal 259286/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15550, signal 259668/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15600, signal 260111/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15650, signal 260344/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15700, signal 260570/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15750, signal 260791/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15800, signal 260983/391871 (executing program) 2024/01/12 13:28:57 fetching corpus: 15850, signal 261273/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 15900, signal 261541/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 15950, signal 261889/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 16000, signal 262179/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 16050, signal 262423/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 16100, signal 262689/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 16150, signal 262917/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 16200, signal 263170/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 16250, signal 263352/391871 (executing program) 2024/01/12 13:28:58 fetching corpus: 16300, signal 263667/391871 (executing program) 2024/01/12 13:28:59 fetching corpus: 16350, signal 264008/391871 (executing program) 2024/01/12 13:28:59 fetching corpus: 16400, signal 264348/391872 (executing program) 2024/01/12 13:28:59 fetching corpus: 16450, signal 264546/391872 (executing program) 2024/01/12 13:28:59 fetching corpus: 16500, signal 264772/391872 (executing program) 2024/01/12 13:28:59 fetching corpus: 16550, signal 265096/391872 (executing program) 2024/01/12 13:28:59 fetching corpus: 16600, signal 265337/391872 (executing program) 2024/01/12 13:29:00 fetching corpus: 16650, signal 265606/391872 (executing program) 2024/01/12 13:29:00 fetching corpus: 16700, signal 265901/391872 (executing program) 2024/01/12 13:29:00 fetching corpus: 16750, signal 266120/391872 (executing program) 2024/01/12 13:29:00 fetching corpus: 16800, signal 266396/391872 (executing program) 2024/01/12 13:29:00 fetching corpus: 16850, signal 266656/391872 (executing program) 2024/01/12 13:29:00 fetching corpus: 16900, signal 267034/391872 (executing program) 2024/01/12 13:29:00 fetching corpus: 16950, signal 267402/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17000, signal 267691/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17050, signal 268095/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17100, signal 268902/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17150, signal 269143/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17200, signal 269395/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17250, signal 269588/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17300, signal 269843/391872 (executing program) 2024/01/12 13:29:01 fetching corpus: 17350, signal 270073/391872 (executing program) 2024/01/12 13:29:02 fetching corpus: 17400, signal 270384/391872 (executing program) 2024/01/12 13:29:02 fetching corpus: 17450, signal 270868/391872 (executing program) 2024/01/12 13:29:02 fetching corpus: 17500, signal 271199/391875 (executing program) 2024/01/12 13:29:02 fetching corpus: 17550, signal 271387/391875 (executing program) 2024/01/12 13:29:02 fetching corpus: 17600, signal 271650/391875 (executing program) 2024/01/12 13:29:02 fetching corpus: 17650, signal 271844/391875 (executing program) 2024/01/12 13:29:02 fetching corpus: 17700, signal 272093/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 17750, signal 272441/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 17800, signal 272641/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 17850, signal 272873/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 17900, signal 273088/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 17950, signal 273362/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 18000, signal 273523/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 18050, signal 273713/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 18100, signal 273946/391875 (executing program) 2024/01/12 13:29:03 fetching corpus: 18150, signal 274114/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18200, signal 274352/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18250, signal 274842/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18300, signal 275078/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18350, signal 275356/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18400, signal 275624/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18450, signal 275885/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18500, signal 276295/391875 (executing program) 2024/01/12 13:29:04 fetching corpus: 18550, signal 276624/391875 (executing program) 2024/01/12 13:29:05 fetching corpus: 18600, signal 276870/391875 (executing program) 2024/01/12 13:29:05 fetching corpus: 18650, signal 277103/391878 (executing program) 2024/01/12 13:29:05 fetching corpus: 18700, signal 277422/391878 (executing program) 2024/01/12 13:29:05 fetching corpus: 18750, signal 277584/391878 (executing program) 2024/01/12 13:29:05 fetching corpus: 18800, signal 277743/391878 (executing program) 2024/01/12 13:29:05 fetching corpus: 18850, signal 278126/391878 (executing program) 2024/01/12 13:29:05 fetching corpus: 18900, signal 278419/391878 (executing program) 2024/01/12 13:29:05 fetching corpus: 18950, signal 278701/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19000, signal 279069/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19050, signal 279355/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19100, signal 279747/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19150, signal 279996/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19200, signal 280212/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19250, signal 280479/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19300, signal 280760/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19350, signal 280915/391878 (executing program) 2024/01/12 13:29:06 fetching corpus: 19400, signal 281203/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19450, signal 281435/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19500, signal 281709/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19550, signal 282077/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19600, signal 282353/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19650, signal 282610/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19700, signal 282902/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19750, signal 283095/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19800, signal 283306/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19850, signal 283661/391878 (executing program) 2024/01/12 13:29:07 fetching corpus: 19900, signal 283842/391878 (executing program) 2024/01/12 13:29:08 fetching corpus: 19950, signal 284136/391878 (executing program) 2024/01/12 13:29:08 fetching corpus: 20000, signal 284392/391878 (executing program) 2024/01/12 13:29:08 fetching corpus: 20050, signal 284611/391878 (executing program) 2024/01/12 13:29:08 fetching corpus: 20100, signal 284993/391878 (executing program) 2024/01/12 13:29:08 fetching corpus: 20150, signal 285201/391880 (executing program) 2024/01/12 13:29:08 fetching corpus: 20200, signal 285438/391880 (executing program) 2024/01/12 13:29:08 fetching corpus: 20250, signal 285683/391880 (executing program) 2024/01/12 13:29:08 fetching corpus: 20300, signal 285907/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20350, signal 286130/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20400, signal 286628/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20450, signal 286897/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20500, signal 287156/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20550, signal 287385/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20600, signal 287578/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20650, signal 287926/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20700, signal 288156/391880 (executing program) 2024/01/12 13:29:09 fetching corpus: 20750, signal 288618/391880 (executing program) 2024/01/12 13:29:10 fetching corpus: 20800, signal 288878/391880 (executing program) 2024/01/12 13:29:10 fetching corpus: 20850, signal 289077/391880 (executing program) 2024/01/12 13:29:10 fetching corpus: 20900, signal 289275/391880 (executing program) 2024/01/12 13:29:10 fetching corpus: 20950, signal 289527/391880 (executing program) 2024/01/12 13:29:10 fetching corpus: 21000, signal 289770/391880 (executing program) 2024/01/12 13:29:10 fetching corpus: 21050, signal 290014/391880 (executing program) 2024/01/12 13:29:11 fetching corpus: 21100, signal 290228/391880 (executing program) 2024/01/12 13:29:11 fetching corpus: 21150, signal 290508/391882 (executing program) 2024/01/12 13:29:11 fetching corpus: 21200, signal 290763/391882 (executing program) 2024/01/12 13:29:11 fetching corpus: 21250, signal 291144/391882 (executing program) 2024/01/12 13:29:11 fetching corpus: 21300, signal 291446/391882 (executing program) 2024/01/12 13:29:11 fetching corpus: 21350, signal 291681/391882 (executing program) 2024/01/12 13:29:11 fetching corpus: 21400, signal 291870/391882 (executing program) 2024/01/12 13:29:11 fetching corpus: 21450, signal 292097/391882 (executing program) 2024/01/12 13:29:12 fetching corpus: 21500, signal 292396/391882 (executing program) 2024/01/12 13:29:12 fetching corpus: 21550, signal 292638/391882 (executing program) 2024/01/12 13:29:12 fetching corpus: 21600, signal 292948/391882 (executing program) 2024/01/12 13:29:12 fetching corpus: 21650, signal 293128/391882 (executing program) 2024/01/12 13:29:12 fetching corpus: 21700, signal 293311/391882 (executing program) 2024/01/12 13:29:12 fetching corpus: 21750, signal 293512/391882 (executing program) 2024/01/12 13:29:12 fetching corpus: 21800, signal 293800/391883 (executing program) 2024/01/12 13:29:12 fetching corpus: 21850, signal 294004/391883 (executing program) 2024/01/12 13:29:12 fetching corpus: 21900, signal 294159/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 21950, signal 294460/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 22000, signal 294661/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 22050, signal 294865/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 22100, signal 295044/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 22150, signal 295294/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 22200, signal 295540/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 22250, signal 295726/391883 (executing program) 2024/01/12 13:29:13 fetching corpus: 22300, signal 295959/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22350, signal 296146/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22400, signal 296490/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22450, signal 296692/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22500, signal 296884/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22550, signal 297107/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22600, signal 297332/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22650, signal 297554/391883 (executing program) 2024/01/12 13:29:14 fetching corpus: 22700, signal 297764/391883 (executing program) 2024/01/12 13:29:15 fetching corpus: 22750, signal 297961/391883 (executing program) 2024/01/12 13:29:15 fetching corpus: 22800, signal 298155/391883 (executing program) 2024/01/12 13:29:15 fetching corpus: 22850, signal 298405/391884 (executing program) 2024/01/12 13:29:15 fetching corpus: 22900, signal 298586/391884 (executing program) 2024/01/12 13:29:15 fetching corpus: 22950, signal 298764/391884 (executing program) 2024/01/12 13:29:15 fetching corpus: 23000, signal 299121/391884 (executing program) 2024/01/12 13:29:15 fetching corpus: 23050, signal 299285/391884 (executing program) 2024/01/12 13:29:15 fetching corpus: 23100, signal 299550/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23150, signal 299841/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23200, signal 300010/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23250, signal 300243/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23300, signal 300448/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23350, signal 300633/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23400, signal 300818/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23450, signal 301054/391884 (executing program) 2024/01/12 13:29:16 fetching corpus: 23500, signal 301251/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23550, signal 301485/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23600, signal 301731/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23650, signal 301952/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23700, signal 302178/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23750, signal 302411/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23800, signal 302669/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23850, signal 302884/391884 (executing program) 2024/01/12 13:29:17 fetching corpus: 23900, signal 303138/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 23950, signal 303307/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24000, signal 303453/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24050, signal 303720/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24100, signal 303896/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24150, signal 304245/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24200, signal 304691/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24250, signal 304887/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24300, signal 305055/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24350, signal 305245/391884 (executing program) 2024/01/12 13:29:18 fetching corpus: 24400, signal 305455/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24450, signal 305647/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24500, signal 305932/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24550, signal 306227/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24600, signal 306405/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24650, signal 306658/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24700, signal 306954/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24750, signal 307264/391884 (executing program) 2024/01/12 13:29:19 fetching corpus: 24800, signal 307569/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 24850, signal 307730/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 24900, signal 307907/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 24950, signal 308120/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 25000, signal 308348/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 25050, signal 308579/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 25100, signal 308775/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 25150, signal 309034/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 25200, signal 309310/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 25250, signal 309504/391884 (executing program) 2024/01/12 13:29:20 fetching corpus: 25300, signal 309691/391884 (executing program) 2024/01/12 13:29:21 fetching corpus: 25350, signal 309892/391884 (executing program) 2024/01/12 13:29:21 fetching corpus: 25400, signal 310144/391884 (executing program) 2024/01/12 13:29:21 fetching corpus: 25450, signal 310288/391884 (executing program) 2024/01/12 13:29:21 fetching corpus: 25500, signal 310616/391884 (executing program) 2024/01/12 13:29:21 fetching corpus: 25550, signal 310892/391884 (executing program) 2024/01/12 13:29:21 fetching corpus: 25600, signal 311057/391884 (executing program) 2024/01/12 13:29:22 fetching corpus: 25650, signal 311319/391884 (executing program) 2024/01/12 13:29:22 fetching corpus: 25700, signal 311473/391884 (executing program) 2024/01/12 13:29:22 fetching corpus: 25750, signal 311709/391884 (executing program) 2024/01/12 13:29:22 fetching corpus: 25800, signal 311946/391884 (executing program) 2024/01/12 13:29:22 fetching corpus: 25850, signal 312168/391885 (executing program) 2024/01/12 13:29:22 fetching corpus: 25900, signal 312442/391885 (executing program) 2024/01/12 13:29:22 fetching corpus: 25950, signal 312581/391885 (executing program) 2024/01/12 13:29:22 fetching corpus: 26000, signal 312732/391885 (executing program) 2024/01/12 13:29:22 fetching corpus: 26050, signal 312894/391885 (executing program) 2024/01/12 13:29:23 fetching corpus: 26100, signal 313261/391885 (executing program) 2024/01/12 13:29:23 fetching corpus: 26150, signal 313477/391885 (executing program) 2024/01/12 13:29:23 fetching corpus: 26200, signal 313737/391885 (executing program) 2024/01/12 13:29:23 fetching corpus: 26250, signal 313936/391885 (executing program) 2024/01/12 13:29:23 fetching corpus: 26300, signal 314124/391885 (executing program) 2024/01/12 13:29:23 fetching corpus: 26350, signal 314359/391885 (executing program) 2024/01/12 13:29:23 fetching corpus: 26400, signal 314549/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26450, signal 314794/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26500, signal 315022/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26550, signal 315185/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26600, signal 315468/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26650, signal 315676/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26700, signal 315903/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26750, signal 316136/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26800, signal 316627/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26850, signal 316747/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26900, signal 317071/391885 (executing program) 2024/01/12 13:29:24 fetching corpus: 26950, signal 317298/391885 (executing program) 2024/01/12 13:29:25 fetching corpus: 27000, signal 317464/391885 (executing program) 2024/01/12 13:29:25 fetching corpus: 27050, signal 317666/391885 (executing program) 2024/01/12 13:29:25 fetching corpus: 27100, signal 317907/391885 (executing program) 2024/01/12 13:29:25 fetching corpus: 27150, signal 318183/391885 (executing program) 2024/01/12 13:29:25 fetching corpus: 27200, signal 318744/391888 (executing program) 2024/01/12 13:29:25 fetching corpus: 27250, signal 318931/391888 (executing program) 2024/01/12 13:29:25 fetching corpus: 27300, signal 319333/391888 (executing program) 2024/01/12 13:29:25 fetching corpus: 27350, signal 319472/391888 (executing program) 2024/01/12 13:29:25 fetching corpus: 27400, signal 319639/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27450, signal 319864/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27500, signal 320052/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27550, signal 320324/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27600, signal 320524/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27650, signal 320771/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27700, signal 320953/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27750, signal 321160/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27800, signal 321362/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27850, signal 321523/391888 (executing program) 2024/01/12 13:29:26 fetching corpus: 27900, signal 321722/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 27950, signal 321868/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28000, signal 322243/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28050, signal 322424/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28100, signal 322564/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28150, signal 322777/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28200, signal 322977/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28250, signal 323164/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28300, signal 323368/391888 (executing program) 2024/01/12 13:29:27 fetching corpus: 28350, signal 323495/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28400, signal 323653/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28450, signal 323870/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28500, signal 324130/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28550, signal 324708/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28600, signal 324898/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28650, signal 325006/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28700, signal 325148/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28750, signal 325404/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28800, signal 325632/391888 (executing program) 2024/01/12 13:29:28 fetching corpus: 28850, signal 325822/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 28900, signal 326022/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 28950, signal 326243/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 29000, signal 326451/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 29050, signal 326680/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 29100, signal 326889/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 29150, signal 327081/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 29200, signal 327210/391888 (executing program) 2024/01/12 13:29:29 fetching corpus: 29250, signal 327360/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29300, signal 327516/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29350, signal 327666/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29400, signal 327933/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29450, signal 328254/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29500, signal 328417/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29550, signal 328608/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29600, signal 328828/391888 (executing program) 2024/01/12 13:29:30 fetching corpus: 29650, signal 329012/391888 (executing program) 2024/01/12 13:29:31 fetching corpus: 29700, signal 329218/391888 (executing program) 2024/01/12 13:29:31 fetching corpus: 29750, signal 329391/391889 (executing program) 2024/01/12 13:29:31 fetching corpus: 29800, signal 329554/391893 (executing program) 2024/01/12 13:29:31 fetching corpus: 29850, signal 329736/391893 (executing program) 2024/01/12 13:29:31 fetching corpus: 29900, signal 329966/391893 (executing program) 2024/01/12 13:29:31 fetching corpus: 29950, signal 330126/391893 (executing program) 2024/01/12 13:29:31 fetching corpus: 30000, signal 330311/391893 (executing program) 2024/01/12 13:29:31 fetching corpus: 30050, signal 330479/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30100, signal 330673/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30150, signal 330987/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30200, signal 331336/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30250, signal 331531/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30300, signal 331696/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30350, signal 331855/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30400, signal 332018/391893 (executing program) 2024/01/12 13:29:32 fetching corpus: 30450, signal 332211/391893 (executing program) 2024/01/12 13:29:33 fetching corpus: 30500, signal 332403/391893 (executing program) 2024/01/12 13:29:33 fetching corpus: 30550, signal 332603/391893 (executing program) 2024/01/12 13:29:33 fetching corpus: 30600, signal 332762/391893 (executing program) 2024/01/12 13:29:33 fetching corpus: 30650, signal 332931/391893 (executing program) 2024/01/12 13:29:33 fetching corpus: 30700, signal 333146/391893 (executing program) 2024/01/12 13:29:33 fetching corpus: 30750, signal 333321/391893 (executing program) 2024/01/12 13:29:33 fetching corpus: 30800, signal 333485/391894 (executing program) 2024/01/12 13:29:33 fetching corpus: 30850, signal 333661/391894 (executing program) 2024/01/12 13:29:33 fetching corpus: 30900, signal 334043/391894 (executing program) 2024/01/12 13:29:33 fetching corpus: 30950, signal 334203/391894 (executing program) 2024/01/12 13:29:34 fetching corpus: 31000, signal 334348/391894 (executing program) 2024/01/12 13:29:34 fetching corpus: 31050, signal 334603/391894 (executing program) 2024/01/12 13:29:34 fetching corpus: 31100, signal 334799/391894 (executing program) 2024/01/12 13:29:34 fetching corpus: 31150, signal 334999/391894 (executing program) 2024/01/12 13:29:34 fetching corpus: 31200, signal 335228/391894 (executing program) 2024/01/12 13:29:34 fetching corpus: 31250, signal 335397/391894 (executing program) 2024/01/12 13:29:34 fetching corpus: 31300, signal 335557/391894 (executing program) 2024/01/12 13:29:35 fetching corpus: 31350, signal 335756/391894 (executing program) 2024/01/12 13:29:35 fetching corpus: 31400, signal 335948/391894 (executing program) 2024/01/12 13:29:35 fetching corpus: 31450, signal 336117/391894 (executing program) 2024/01/12 13:29:35 fetching corpus: 31500, signal 336290/391894 (executing program) 2024/01/12 13:29:35 fetching corpus: 31550, signal 336471/391894 (executing program) 2024/01/12 13:29:35 fetching corpus: 31600, signal 336608/391894 (executing program) 2024/01/12 13:29:35 fetching corpus: 31650, signal 336768/391894 (executing program) 2024/01/12 13:29:36 fetching corpus: 31700, signal 336948/391894 (executing program) 2024/01/12 13:29:36 fetching corpus: 31750, signal 337151/391894 (executing program) 2024/01/12 13:29:36 fetching corpus: 31800, signal 337302/391894 (executing program) 2024/01/12 13:29:36 fetching corpus: 31850, signal 337419/391894 (executing program) 2024/01/12 13:29:36 fetching corpus: 31900, signal 337567/391894 (executing program) 2024/01/12 13:29:36 fetching corpus: 31950, signal 337932/391894 (executing program) 2024/01/12 13:29:36 fetching corpus: 32000, signal 338145/391894 (executing program) 2024/01/12 13:29:37 fetching corpus: 32050, signal 338317/391894 (executing program) 2024/01/12 13:29:37 fetching corpus: 32100, signal 338452/391894 (executing program) 2024/01/12 13:29:37 fetching corpus: 32150, signal 338626/391897 (executing program) 2024/01/12 13:29:37 fetching corpus: 32200, signal 338796/391897 (executing program) 2024/01/12 13:29:37 fetching corpus: 32250, signal 338945/391897 (executing program) 2024/01/12 13:29:37 fetching corpus: 32300, signal 339166/391897 (executing program) 2024/01/12 13:29:37 fetching corpus: 32350, signal 339304/391897 (executing program) 2024/01/12 13:29:37 fetching corpus: 32400, signal 339448/391897 (executing program) 2024/01/12 13:29:37 fetching corpus: 32450, signal 339641/391897 (executing program) 2024/01/12 13:29:37 fetching corpus: 32500, signal 339808/391897 (executing program) 2024/01/12 13:29:38 fetching corpus: 32550, signal 339972/391897 (executing program) 2024/01/12 13:29:38 fetching corpus: 32600, signal 340114/391897 (executing program) 2024/01/12 13:29:38 fetching corpus: 32650, signal 340292/391897 (executing program) 2024/01/12 13:29:38 fetching corpus: 32700, signal 340457/391897 (executing program) 2024/01/12 13:29:38 fetching corpus: 32750, signal 340638/391897 (executing program) 2024/01/12 13:29:38 fetching corpus: 32800, signal 340817/391897 (executing program) 2024/01/12 13:29:38 fetching corpus: 32850, signal 340960/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 32900, signal 341138/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 32950, signal 341381/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 33000, signal 341618/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 33050, signal 341761/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 33100, signal 341888/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 33150, signal 342038/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 33200, signal 342239/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 33250, signal 342472/391902 (executing program) 2024/01/12 13:29:39 fetching corpus: 33300, signal 342941/391902 (executing program) 2024/01/12 13:29:40 fetching corpus: 33350, signal 343104/391902 (executing program) 2024/01/12 13:29:40 fetching corpus: 33400, signal 343245/391902 (executing program) 2024/01/12 13:29:40 fetching corpus: 33450, signal 343344/391902 (executing program) 2024/01/12 13:29:40 fetching corpus: 33500, signal 343501/391902 (executing program) 2024/01/12 13:29:40 fetching corpus: 33550, signal 343675/391902 (executing program) 2024/01/12 13:29:40 fetching corpus: 33600, signal 343785/391903 (executing program) 2024/01/12 13:29:40 fetching corpus: 33650, signal 343920/391903 (executing program) 2024/01/12 13:29:40 fetching corpus: 33700, signal 344090/391903 (executing program) 2024/01/12 13:29:40 fetching corpus: 33750, signal 344275/391903 (executing program) 2024/01/12 13:29:40 fetching corpus: 33800, signal 344407/391903 (executing program) 2024/01/12 13:29:40 fetching corpus: 33850, signal 344561/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 33900, signal 344750/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 33950, signal 344933/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34000, signal 345089/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34050, signal 345285/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34100, signal 345414/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34150, signal 345575/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34200, signal 345738/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34250, signal 345898/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34300, signal 346044/391903 (executing program) 2024/01/12 13:29:41 fetching corpus: 34350, signal 346282/391903 (executing program) 2024/01/12 13:29:42 fetching corpus: 34400, signal 346410/391903 (executing program) 2024/01/12 13:29:42 fetching corpus: 34450, signal 346621/391903 (executing program) 2024/01/12 13:29:42 fetching corpus: 34500, signal 346765/391903 (executing program) 2024/01/12 13:29:42 fetching corpus: 34550, signal 347000/391903 (executing program) 2024/01/12 13:29:42 fetching corpus: 34600, signal 347143/391903 (executing program) 2024/01/12 13:29:42 fetching corpus: 34650, signal 347268/391903 (executing program) 2024/01/12 13:29:42 fetching corpus: 34700, signal 347419/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 34750, signal 347590/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 34800, signal 347742/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 34850, signal 347943/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 34900, signal 348139/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 34950, signal 348396/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 35000, signal 348601/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 35050, signal 348746/391903 (executing program) 2024/01/12 13:29:43 fetching corpus: 35100, signal 348927/391903 (executing program) 2024/01/12 13:29:44 fetching corpus: 35150, signal 349096/391903 (executing program) 2024/01/12 13:29:44 fetching corpus: 35200, signal 349274/391903 (executing program) 2024/01/12 13:29:44 fetching corpus: 35250, signal 349412/391907 (executing program) 2024/01/12 13:29:44 fetching corpus: 35300, signal 349584/391907 (executing program) 2024/01/12 13:29:44 fetching corpus: 35350, signal 349741/391907 (executing program) 2024/01/12 13:29:44 fetching corpus: 35400, signal 349892/391907 (executing program) 2024/01/12 13:29:44 fetching corpus: 35450, signal 350019/391907 (executing program) 2024/01/12 13:29:44 fetching corpus: 35500, signal 350145/391907 (executing program) 2024/01/12 13:29:44 fetching corpus: 35550, signal 350298/391907 (executing program) 2024/01/12 13:29:44 fetching corpus: 35600, signal 350476/391907 (executing program) 2024/01/12 13:29:45 fetching corpus: 35650, signal 350653/391907 (executing program) 2024/01/12 13:29:45 fetching corpus: 35700, signal 350804/391907 (executing program) 2024/01/12 13:29:45 fetching corpus: 35750, signal 350914/391907 (executing program) 2024/01/12 13:29:45 fetching corpus: 35800, signal 351034/391907 (executing program) 2024/01/12 13:29:45 fetching corpus: 35850, signal 351179/391907 (executing program) 2024/01/12 13:29:45 fetching corpus: 35900, signal 351349/391907 (executing program) [ 275.357140][ T1211] ieee802154 phy0 wpan0: encryption failed: -22 [ 275.363899][ T1211] ieee802154 phy1 wpan1: encryption failed: -22 2024/01/12 13:29:46 fetching corpus: 35950, signal 351571/391907 (executing program) 2024/01/12 13:29:46 fetching corpus: 36000, signal 351714/391907 (executing program) 2024/01/12 13:29:46 fetching corpus: 36050, signal 351875/391907 (executing program) 2024/01/12 13:29:46 fetching corpus: 36100, signal 352031/391907 (executing program) 2024/01/12 13:29:46 fetching corpus: 36150, signal 352268/391907 (executing program) 2024/01/12 13:29:46 fetching corpus: 36200, signal 352445/391907 (executing program) 2024/01/12 13:29:47 fetching corpus: 36250, signal 352560/391907 (executing program) 2024/01/12 13:29:47 fetching corpus: 36300, signal 352757/391909 (executing program) 2024/01/12 13:29:47 fetching corpus: 36350, signal 352942/391909 (executing program) 2024/01/12 13:29:47 fetching corpus: 36400, signal 353067/391909 (executing program) 2024/01/12 13:29:48 fetching corpus: 36450, signal 353215/391909 (executing program) 2024/01/12 13:29:48 fetching corpus: 36500, signal 353366/391909 (executing program) 2024/01/12 13:29:48 fetching corpus: 36550, signal 353494/391909 (executing program) 2024/01/12 13:29:48 fetching corpus: 36600, signal 353635/391909 (executing program) 2024/01/12 13:29:48 fetching corpus: 36650, signal 353765/391909 (executing program) 2024/01/12 13:29:48 fetching corpus: 36700, signal 353883/391909 (executing program) 2024/01/12 13:29:48 fetching corpus: 36750, signal 354005/391910 (executing program) 2024/01/12 13:29:48 fetching corpus: 36800, signal 354141/391910 (executing program) 2024/01/12 13:29:48 fetching corpus: 36850, signal 354294/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 36900, signal 354435/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 36950, signal 354588/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 37000, signal 354786/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 37050, signal 354949/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 37100, signal 355108/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 37150, signal 355247/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 37200, signal 355407/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 37250, signal 355541/391910 (executing program) 2024/01/12 13:29:49 fetching corpus: 37300, signal 355670/391910 (executing program) 2024/01/12 13:29:50 fetching corpus: 37350, signal 355894/391910 (executing program) 2024/01/12 13:29:50 fetching corpus: 37400, signal 356057/391910 (executing program) 2024/01/12 13:29:50 fetching corpus: 37450, signal 356304/391910 (executing program) 2024/01/12 13:29:50 fetching corpus: 37500, signal 356472/391910 (executing program) 2024/01/12 13:29:50 fetching corpus: 37550, signal 356575/391914 (executing program) 2024/01/12 13:29:50 fetching corpus: 37600, signal 356724/391914 (executing program) 2024/01/12 13:29:50 fetching corpus: 37650, signal 356937/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 37700, signal 357077/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 37750, signal 357211/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 37800, signal 357360/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 37850, signal 357541/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 37900, signal 357717/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 37950, signal 358117/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 38000, signal 358248/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 38050, signal 358404/391914 (executing program) 2024/01/12 13:29:51 fetching corpus: 38100, signal 358544/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38150, signal 358695/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38200, signal 358804/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38250, signal 358941/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38300, signal 359215/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38350, signal 359379/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38400, signal 359530/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38450, signal 359696/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38500, signal 359834/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38550, signal 359984/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38600, signal 360105/391914 (executing program) 2024/01/12 13:29:52 fetching corpus: 38650, signal 360275/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 38700, signal 360424/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 38750, signal 360646/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 38800, signal 360765/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 38850, signal 360945/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 38900, signal 361121/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 38950, signal 361320/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 39000, signal 361441/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 39050, signal 361614/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 39100, signal 361732/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 39150, signal 361874/391914 (executing program) 2024/01/12 13:29:53 fetching corpus: 39200, signal 362022/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39250, signal 362134/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39300, signal 362266/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39350, signal 362398/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39400, signal 362548/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39450, signal 362765/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39500, signal 362914/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39550, signal 363060/391914 (executing program) 2024/01/12 13:29:54 fetching corpus: 39600, signal 363216/391914 (executing program) 2024/01/12 13:29:55 fetching corpus: 39650, signal 363336/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 39700, signal 363458/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 39750, signal 363592/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 39800, signal 363716/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 39850, signal 363860/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 39900, signal 363992/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 39950, signal 364107/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 40000, signal 364277/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 40050, signal 364429/391917 (executing program) 2024/01/12 13:29:55 fetching corpus: 40100, signal 364552/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40150, signal 364676/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40200, signal 364827/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40250, signal 364966/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40300, signal 365125/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40350, signal 365278/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40400, signal 365551/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40450, signal 365698/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40500, signal 365813/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40550, signal 365993/391917 (executing program) 2024/01/12 13:29:56 fetching corpus: 40600, signal 366128/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 40650, signal 366285/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 40700, signal 366422/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 40750, signal 366569/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 40800, signal 366721/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 40850, signal 366990/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 40900, signal 367169/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 40950, signal 367346/391917 (executing program) 2024/01/12 13:29:57 fetching corpus: 41000, signal 367492/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41050, signal 367601/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41100, signal 367801/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41150, signal 367941/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41200, signal 368096/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41250, signal 368254/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41300, signal 368385/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41350, signal 368663/391917 (executing program) 2024/01/12 13:29:58 fetching corpus: 41400, signal 368830/391917 (executing program) 2024/01/12 13:29:59 fetching corpus: 41450, signal 368970/391917 (executing program) 2024/01/12 13:29:59 fetching corpus: 41500, signal 369095/391917 (executing program) 2024/01/12 13:29:59 fetching corpus: 41550, signal 369202/391917 (executing program) 2024/01/12 13:29:59 fetching corpus: 41600, signal 369326/391917 (executing program) 2024/01/12 13:29:59 fetching corpus: 41650, signal 369458/391917 (executing program) 2024/01/12 13:29:59 fetching corpus: 41700, signal 369623/391917 (executing program) 2024/01/12 13:29:59 fetching corpus: 41750, signal 369759/391917 (executing program) 2024/01/12 13:30:00 fetching corpus: 41800, signal 369884/391917 (executing program) 2024/01/12 13:30:00 fetching corpus: 41850, signal 370103/391927 (executing program) 2024/01/12 13:30:00 fetching corpus: 41900, signal 370220/391927 (executing program) 2024/01/12 13:30:00 fetching corpus: 41950, signal 370352/391927 (executing program) 2024/01/12 13:30:00 fetching corpus: 42000, signal 370468/391927 (executing program) 2024/01/12 13:30:00 fetching corpus: 42050, signal 370597/391927 (executing program) 2024/01/12 13:30:00 fetching corpus: 42100, signal 370720/391927 (executing program) 2024/01/12 13:30:00 fetching corpus: 42150, signal 370859/391927 (executing program) 2024/01/12 13:30:01 fetching corpus: 42200, signal 371058/391927 (executing program) 2024/01/12 13:30:01 fetching corpus: 42250, signal 371189/391927 (executing program) 2024/01/12 13:30:01 fetching corpus: 42300, signal 371365/391927 (executing program) 2024/01/12 13:30:01 fetching corpus: 42350, signal 371511/391927 (executing program) 2024/01/12 13:30:01 fetching corpus: 42400, signal 371617/391927 (executing program) 2024/01/12 13:30:01 fetching corpus: 42450, signal 371731/391927 (executing program) 2024/01/12 13:30:01 fetching corpus: 42500, signal 371921/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42550, signal 372046/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42600, signal 372199/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42650, signal 372313/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42700, signal 372457/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42750, signal 372602/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42800, signal 372754/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42850, signal 372891/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42900, signal 373069/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 42950, signal 373194/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 43000, signal 373323/391927 (executing program) 2024/01/12 13:30:02 fetching corpus: 43050, signal 373492/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43100, signal 373738/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43150, signal 373903/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43200, signal 374047/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43250, signal 374222/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43300, signal 374374/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43350, signal 374533/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43400, signal 374701/391927 (executing program) 2024/01/12 13:30:03 fetching corpus: 43450, signal 374840/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43500, signal 374988/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43550, signal 375123/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43600, signal 375241/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43650, signal 375380/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43700, signal 375496/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43750, signal 375669/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43800, signal 375787/391927 (executing program) 2024/01/12 13:30:04 fetching corpus: 43850, signal 375964/391929 (executing program) 2024/01/12 13:30:04 fetching corpus: 43900, signal 376082/391929 (executing program) 2024/01/12 13:30:04 fetching corpus: 43950, signal 376198/391929 (executing program) 2024/01/12 13:30:05 fetching corpus: 44000, signal 376315/391929 (executing program) 2024/01/12 13:30:05 fetching corpus: 44050, signal 376435/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44100, signal 376830/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44150, signal 376908/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44200, signal 377094/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44250, signal 377239/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44300, signal 377414/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44350, signal 377539/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44374, signal 377584/391932 (executing program) 2024/01/12 13:30:05 fetching corpus: 44374, signal 377584/391932 (executing program) 2024/01/12 13:30:10 starting 6 fuzzer processes 13:30:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:10 executing program 1: r0 = socket(0x26, 0x5, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r0) 13:30:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:30:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:10 executing program 3: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) syz_io_uring_setup(0x2519, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) 13:30:10 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 300.808654][ T5034] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 300.817739][ T5034] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 300.842805][ T5034] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 300.893285][ T47] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 300.912412][ T47] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 300.920927][ T5038] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 300.929137][ T47] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 300.940919][ T5039] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 300.949868][ T47] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 300.950310][ T5039] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 300.965951][ T5039] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 300.978263][ T5039] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 301.005702][ T47] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 301.022021][ T5039] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 301.033543][ T4391] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 301.041720][ T5039] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 301.046521][ T5042] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 301.050279][ T4391] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 301.059529][ T5042] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 301.083240][ T4391] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 301.099890][ T5042] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 301.167944][ T4391] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 301.178680][ T4391] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 301.188401][ T4391] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 301.551315][ T5042] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 301.560337][ T5042] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 301.569935][ T5042] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 301.583594][ T5042] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 301.630131][ T5042] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 301.640549][ T5042] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 301.653394][ T5042] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 301.677404][ T5036] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 301.689937][ T5042] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 301.691057][ T5036] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 301.705566][ T5042] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 301.728319][ T5036] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 302.781718][ T5031] chnl_net:caif_netlink_parms(): no params data found [ 302.799743][ T5033] chnl_net:caif_netlink_parms(): no params data found [ 303.051645][ T4391] Bluetooth: hci0: command 0x0409 tx timeout [ 303.102238][ T4391] Bluetooth: hci2: command 0x0409 tx timeout [ 303.108482][ T4391] Bluetooth: hci1: command 0x0409 tx timeout [ 303.189732][ T5037] chnl_net:caif_netlink_parms(): no params data found [ 303.261943][ T5036] Bluetooth: hci3: command 0x0409 tx timeout [ 303.690347][ T5047] chnl_net:caif_netlink_parms(): no params data found [ 303.808212][ T5043] chnl_net:caif_netlink_parms(): no params data found [ 303.821634][ T5036] Bluetooth: hci5: command 0x0409 tx timeout [ 303.827871][ T5036] Bluetooth: hci4: command 0x0409 tx timeout [ 304.200208][ T5031] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.210599][ T5031] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.218481][ T5031] bridge_slave_0: entered allmulticast mode [ 304.227360][ T5031] bridge_slave_0: entered promiscuous mode [ 304.292231][ T5031] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.299909][ T5031] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.307717][ T5031] bridge_slave_1: entered allmulticast mode [ 304.316870][ T5031] bridge_slave_1: entered promiscuous mode [ 304.341270][ T5033] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.349221][ T5033] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.357715][ T5033] bridge_slave_0: entered allmulticast mode [ 304.366641][ T5033] bridge_slave_0: entered promiscuous mode [ 304.503811][ T5049] chnl_net:caif_netlink_parms(): no params data found [ 304.534618][ T5031] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.544641][ T5033] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.553540][ T5033] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.561168][ T5033] bridge_slave_1: entered allmulticast mode [ 304.570041][ T5033] bridge_slave_1: entered promiscuous mode [ 304.643415][ T5031] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.847870][ T5037] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.855744][ T5037] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.863511][ T5037] bridge_slave_0: entered allmulticast mode [ 304.872116][ T5037] bridge_slave_0: entered promiscuous mode [ 304.932716][ T5033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.963248][ T5031] team0: Port device team_slave_0 added [ 304.981928][ T5037] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.989617][ T5037] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.997587][ T5037] bridge_slave_1: entered allmulticast mode [ 305.006383][ T5037] bridge_slave_1: entered promiscuous mode [ 305.022550][ T5031] team0: Port device team_slave_1 added [ 305.049058][ T5033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.126142][ T5036] Bluetooth: hci0: command 0x041b tx timeout [ 305.181683][ T5036] Bluetooth: hci1: command 0x041b tx timeout [ 305.187919][ T5036] Bluetooth: hci2: command 0x041b tx timeout [ 305.369171][ T4391] Bluetooth: hci3: command 0x041b tx timeout [ 305.477724][ T5031] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 305.485166][ T5031] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.511613][ T5031] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 305.584826][ T5037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.600541][ T5033] team0: Port device team_slave_0 added [ 305.615683][ T5047] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.623481][ T5047] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.631132][ T5047] bridge_slave_0: entered allmulticast mode [ 305.639917][ T5047] bridge_slave_0: entered promiscuous mode [ 305.659575][ T5033] team0: Port device team_slave_1 added [ 305.669325][ T5031] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 305.676642][ T5031] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.703003][ T5031] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 305.715931][ T5043] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.727180][ T5043] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.735354][ T5043] bridge_slave_0: entered allmulticast mode [ 305.744416][ T5043] bridge_slave_0: entered promiscuous mode [ 305.770070][ T5037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.779998][ T5043] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.791299][ T5043] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.802188][ T5043] bridge_slave_1: entered allmulticast mode [ 305.811029][ T5043] bridge_slave_1: entered promiscuous mode [ 305.890808][ T5047] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.898607][ T5047] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.906668][ T5047] bridge_slave_1: entered allmulticast mode [ 305.915729][ T5047] bridge_slave_1: entered promiscuous mode [ 305.916198][ T4391] Bluetooth: hci4: command 0x041b tx timeout [ 305.924870][ T5036] Bluetooth: hci5: command 0x041b tx timeout [ 306.109313][ T5033] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 306.116763][ T5033] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.143219][ T5033] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 306.197219][ T5047] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 306.257578][ T5037] team0: Port device team_slave_0 added [ 306.362159][ T5033] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 306.369310][ T5033] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.395828][ T5033] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 306.416126][ T5047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 306.460958][ T5037] team0: Port device team_slave_1 added [ 306.480602][ T5031] hsr_slave_0: entered promiscuous mode [ 306.490836][ T5031] hsr_slave_1: entered promiscuous mode [ 306.508443][ T5043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 306.518410][ T5049] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.526486][ T5049] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.534227][ T5049] bridge_slave_0: entered allmulticast mode [ 306.543222][ T5049] bridge_slave_0: entered promiscuous mode [ 306.574754][ T5049] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.582595][ T5049] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.590208][ T5049] bridge_slave_1: entered allmulticast mode [ 306.599113][ T5049] bridge_slave_1: entered promiscuous mode [ 306.714502][ T5043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 306.822132][ T5047] team0: Port device team_slave_0 added [ 306.868776][ T5037] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 306.876275][ T5037] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.902683][ T5037] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 306.959769][ T5049] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 307.010588][ T5047] team0: Port device team_slave_1 added [ 307.032088][ T5037] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 307.039267][ T5037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.065555][ T5037] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 307.083964][ T5043] team0: Port device team_slave_0 added [ 307.098675][ T5049] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 307.181741][ T5036] Bluetooth: hci0: command 0x040f tx timeout [ 307.235351][ T5043] team0: Port device team_slave_1 added [ 307.271584][ T5036] Bluetooth: hci2: command 0x040f tx timeout [ 307.277829][ T5036] Bluetooth: hci1: command 0x040f tx timeout [ 307.336824][ T5033] hsr_slave_0: entered promiscuous mode [ 307.346670][ T5033] hsr_slave_1: entered promiscuous mode [ 307.355018][ T5033] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 307.362804][ T5033] Cannot create hsr debugfs directory [ 307.412538][ T5047] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 307.419685][ T5047] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.446149][ T5047] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 307.458406][ T4391] Bluetooth: hci3: command 0x040f tx timeout [ 307.535995][ T5049] team0: Port device team_slave_0 added [ 307.545268][ T5043] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 307.552704][ T5043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.579046][ T5043] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 307.601233][ T5047] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 307.608763][ T5047] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.635247][ T5047] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 307.662286][ T5043] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 307.669439][ T5043] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.695953][ T5043] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 307.757653][ T5049] team0: Port device team_slave_1 added [ 307.925025][ T5037] hsr_slave_0: entered promiscuous mode [ 307.934602][ T5037] hsr_slave_1: entered promiscuous mode [ 307.943188][ T5037] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 307.950909][ T5037] Cannot create hsr debugfs directory [ 307.995872][ T4391] Bluetooth: hci5: command 0x040f tx timeout [ 308.002719][ T5036] Bluetooth: hci4: command 0x040f tx timeout [ 308.187166][ T5049] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 308.194453][ T5049] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.220627][ T5049] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 308.326023][ T5047] hsr_slave_0: entered promiscuous mode [ 308.336164][ T5047] hsr_slave_1: entered promiscuous mode [ 308.344435][ T5047] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 308.352162][ T5047] Cannot create hsr debugfs directory [ 308.360267][ T5049] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 308.367549][ T5049] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.393922][ T5049] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 308.431034][ T5043] hsr_slave_0: entered promiscuous mode [ 308.440990][ T5043] hsr_slave_1: entered promiscuous mode [ 308.449289][ T5043] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 308.457077][ T5043] Cannot create hsr debugfs directory [ 309.197155][ T5049] hsr_slave_0: entered promiscuous mode [ 309.207462][ T5049] hsr_slave_1: entered promiscuous mode [ 309.216552][ T5049] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 309.224400][ T5049] Cannot create hsr debugfs directory [ 309.291996][ T5036] Bluetooth: hci0: command 0x0419 tx timeout [ 309.335261][ T5031] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 309.342332][ T5036] Bluetooth: hci1: command 0x0419 tx timeout [ 309.342467][ T4391] Bluetooth: hci2: command 0x0419 tx timeout [ 309.367622][ T5031] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 309.498404][ T5031] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 309.518304][ T4391] Bluetooth: hci3: command 0x0419 tx timeout [ 309.612899][ T5031] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 310.062220][ T4391] Bluetooth: hci4: command 0x0419 tx timeout [ 310.066674][ T5037] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 310.068383][ T4391] Bluetooth: hci5: command 0x0419 tx timeout [ 310.108733][ T5037] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 310.152969][ T5037] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 310.224435][ T5037] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 310.425877][ T5033] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 310.450160][ T5033] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 310.621144][ T5033] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 310.663599][ T5033] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 310.972557][ T5047] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 310.994116][ T5047] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 311.024726][ T5047] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 311.067097][ T5047] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 311.503949][ T5043] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 311.656027][ T5043] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 311.699383][ T5031] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.743356][ T5049] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 311.786709][ T5043] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 311.820387][ T5043] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 311.845366][ T5049] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 311.930743][ T5049] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 311.959813][ T5049] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 312.024950][ T5031] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.086745][ T5101] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.094497][ T5101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.252301][ T5101] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.259941][ T5101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.599433][ T5033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.678474][ T5037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.791274][ T5047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.929871][ T5033] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.948445][ T5037] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.060920][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.068716][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.201780][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.209424][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.232310][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.239951][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.322708][ T5047] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.493718][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.501516][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.529905][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.537640][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.557293][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.565185][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.619736][ T5043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.814026][ T5049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.971189][ T5043] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.097747][ T774] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.105513][ T774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.175435][ T5049] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.365088][ T5047] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.427765][ T774] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.435566][ T774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.455423][ T774] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.463170][ T774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.484577][ T774] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.492305][ T774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.909879][ T5031] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.935755][ T5043] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.947385][ T5043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 315.805668][ T5031] veth0_vlan: entered promiscuous mode [ 315.973887][ T5031] veth1_vlan: entered promiscuous mode [ 316.490816][ T5031] veth0_macvtap: entered promiscuous mode [ 316.590165][ T5037] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.608294][ T5031] veth1_macvtap: entered promiscuous mode [ 316.632462][ T5033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.665490][ T5047] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.910426][ T5031] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 317.001238][ T5031] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 317.136547][ T5031] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.145754][ T5031] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.155014][ T5031] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.164110][ T5031] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.261236][ T5043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.359301][ T5049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.459110][ T5037] veth0_vlan: entered promiscuous mode [ 317.570811][ T5033] veth0_vlan: entered promiscuous mode [ 317.621972][ T5037] veth1_vlan: entered promiscuous mode [ 317.827709][ T5033] veth1_vlan: entered promiscuous mode [ 318.120642][ T5037] veth0_macvtap: entered promiscuous mode [ 318.181606][ T5049] veth0_vlan: entered promiscuous mode [ 318.239574][ T5037] veth1_macvtap: entered promiscuous mode [ 318.390326][ T5049] veth1_vlan: entered promiscuous mode [ 318.426445][ T5033] veth0_macvtap: entered promiscuous mode [ 318.465444][ T5037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 318.476298][ T5037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.491989][ T5037] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 318.588458][ T5033] veth1_macvtap: entered promiscuous mode [ 318.723100][ T5037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 318.733883][ T5037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.752780][ T5037] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 318.838048][ T5033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 318.850677][ T5033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.860860][ T5033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 318.872735][ T5033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.888302][ T5033] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 318.976112][ T5037] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.986240][ T5037] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.995504][ T5037] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.004616][ T5037] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.082459][ T5049] veth0_macvtap: entered promiscuous mode [ 319.176901][ T5033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.188508][ T5033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.199865][ T5033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.212077][ T5033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.228703][ T5033] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 319.241749][ T5049] veth1_macvtap: entered promiscuous mode [ 319.452642][ T5033] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.464076][ T5033] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.473701][ T5033] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.482848][ T5033] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.585888][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.596658][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.606871][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.617606][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.628382][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.639196][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.654941][ T5049] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 320.001170][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 320.014012][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.025622][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 320.037447][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.047693][ T5049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 320.058454][ T5049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.074234][ T5049] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 320.129147][ T5047] veth0_vlan: entered promiscuous mode [ 320.324423][ T5047] veth1_vlan: entered promiscuous mode [ 320.345558][ T5049] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.354724][ T5049] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.363925][ T5049] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.372995][ T5049] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.667090][ T5043] veth0_vlan: entered promiscuous mode [ 320.873020][ T5047] veth0_macvtap: entered promiscuous mode [ 320.905671][ T5043] veth1_vlan: entered promiscuous mode [ 321.047368][ T5047] veth1_macvtap: entered promiscuous mode [ 321.259250][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 321.271932][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.283459][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 321.295002][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.305064][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 321.315741][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.325846][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 321.336570][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.352474][ T5047] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 321.513627][ T5043] veth0_macvtap: entered promiscuous mode [ 321.618107][ T5043] veth1_macvtap: entered promiscuous mode [ 321.710140][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 321.721037][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.731438][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 321.743552][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.754570][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 321.765391][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.775516][ T5047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 321.786293][ T5047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.802146][ T5047] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 321.966921][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 321.977906][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.988831][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 322.001078][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.011374][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 322.022138][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.032341][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 322.043102][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.053250][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 322.114315][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.130133][ T5043] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 322.257933][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 322.268801][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.279236][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 322.289955][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.300041][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 322.310835][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.322179][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 322.333917][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.344284][ T5043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 322.355013][ T5043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 322.370568][ T5043] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 322.386795][ T5047] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.397503][ T5047] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.407173][ T5047] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.416290][ T5047] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.767376][ T5043] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.778084][ T5043] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.788942][ T5043] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.799310][ T5043] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.217889][ T5096] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 325.226096][ T5096] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 325.384214][ T2905] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 325.392557][ T2905] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:30:36 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040), 0xe) [ 326.909074][ T52] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 326.918159][ T52] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:30:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x49}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) [ 327.136361][ T2986] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 327.144853][ T2986] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 327.265907][ T67] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 327.274176][ T67] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 327.564756][ T2986] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 327.573802][ T2986] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:30:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="00e789da34e04a1ffba7f05c07001a000100000000897b2a1d84f571cf3b49d4657bc7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f0e9d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d3f00d6bf7da9299e6e81c96daf520300a1c0ff16cca5c680017e15f9b683e63cfff7c638bca835b33bc18c4ed0351cd285197b0241569048010416ba1c57217be5a338392f831637ee8c25bb2183634a33b18c4b455ab222d7060000000000665106000000a803d1b56126efec0225a5433883b0d17cb21dbfd886caf2624e7f00da0ef9893ef57c79a182dceca9c46a9f8b001e53b29c0c698ed30d8942e94ac057bde74e42021d895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c15255a21945ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e900000000000000dc85131317c56465978d957d000000000000000000000000000000000000000000000000000000000000000000301171e8e3a2d0c842c20fd293c073b93f7662fad1f4ae3e1fe359aa29a4b8965229fa06b0fb2e23d2644cfbdbd6929aa42151ea48334743ad0c378641e74d55d6cd7b098599190100000055ec9c0c26b71588d6fc97e3098fb0e778be446659cf7f5e7f848d85de70c3c426a539a9a0e92e7bbf77528053dcb3b791b8e3faae507a3b721b670b06b78bb09e82ecc85a4bbc596d8ce02a2cbede5573f8bdc84d61a50e74ec0f0800f3d82c2d2b5a20ec152df14481c3bb59a23e014d07fc070d87f58118f468bf80283e0ce7efda7906f9c53319aef22e01a9ba5649fc10fb5b8132dcf42c47f12f9efb9f720ebd2dcc1634f870cee6201bc0ad9e17c4633a17de505bed8fded3053cb455636132bdae3239b9c8b437256ac21a49c4f03b268c47e9becbaff440728429f9e0b02224a7188b745b3c871d01f27eb4e5e00bcd79b956010954a8fa16ab5629b9c40c8e044345a8a17adcea5bd8cfbfa85c8b6133633083d5c86628a128be16d6a691e3aea7832645291c66500df85e30f6320c2d3f204f52d51368eb72ef7595324e450100000000000000dc44127a3b44af9eef449af8c5cf6748fdb52a0cf7d8865b2f378cb7e7c39d7a7f93c1", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x3af4701e) io_setup(0x0, &(0x7f0000000280)=0x0) io_submit(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) 13:30:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x20040006, 0x17800, 0xffcf0000}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) io_setup(0x9, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0xffffff7f00000000, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)='9', 0x1, 0xb00}]) [ 328.394338][ T67] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 328.402427][ T67] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 328.638630][ T5259] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 328.755117][ T4257] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 328.763927][ T4257] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:30:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 329.454301][ T5267] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 329.551916][ T5256] loop1: detected capacity change from 0 to 8192 [ 329.582787][ T5256] ======================================================= [ 329.582787][ T5256] WARNING: The mand mount option has been deprecated and [ 329.582787][ T5256] and is ignored by this kernel. Remove the mand [ 329.582787][ T5256] option from the mount to silence this warning. [ 329.582787][ T5256] ======================================================= 13:30:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000380)='./file0\x00', &(0x7f0000001280)=""/4096) [ 329.938184][ T5263] loop2: detected capacity change from 0 to 8192 [ 330.029781][ T67] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 330.037941][ T67] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 330.153883][ T5276] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:30:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) [ 330.221048][ T67] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 330.229469][ T67] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:30:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5d}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) [ 331.060995][ T2905] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 331.070489][ T2905] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 331.389077][ T4257] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 331.397694][ T4257] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 331.483353][ T5285] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:30:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x53}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x51}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 331.855939][ T5278] loop3: detected capacity change from 0 to 8192 13:30:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x83}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) [ 332.327828][ T5293] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:30:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x53}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x76}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x53}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 333.331553][ T5308] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:30:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000300)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000340)="d6", 0x1, 0x4c844, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c) 13:30:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x87}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x53}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 334.132601][ T5320] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:30:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000300)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000340)="d6", 0x1, 0x4c844, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c) 13:30:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x87}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7b}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000300)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000340)="d6", 0x1, 0x4c844, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c) 13:30:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 335.001717][ T5333] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:30:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x87}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7b}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000300)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000340)="d6", 0x1, 0x4c844, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c) 13:30:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7b}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x87}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x99}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7b}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8d}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x61}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) [ 336.799800][ T1211] ieee802154 phy0 wpan0: encryption failed: -22 [ 336.806530][ T1211] ieee802154 phy1 wpan1: encryption failed: -22 13:30:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x40, 0x9, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8}}]}]}, 0x40}}, 0x0) 13:30:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8d}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x61}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8d}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x61}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg(r0, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/182, 0xb6, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x61}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8d}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f00000005c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f00000051c0), &(0x7f0000005200)='./file0\x00', 0x1000008, &(0x7f0000000280)={[{@datacow}, {@clear_cache}, {@nodatasum}, {@rescan_uuid_tree}, {}, {@space_cache_v1}]}, 0xfe, 0x51ab, &(0x7f0000005280)="$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") rename(&(0x7f0000000900)='./file1\x00', &(0x7f0000000940)='./file2\x00') 13:30:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:50 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x15) 13:30:51 executing program 2: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x5ff, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f00000000c0)="405b2d041eb86496", 0x8}]) 13:30:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:51 executing program 3: r0 = eventfd2(0x6, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 13:30:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:51 executing program 0: close(0xffffffffffffffff) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:52 executing program 3: r0 = eventfd2(0x6, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 13:30:52 executing program 2: syz_clone(0x0, &(0x7f0000004980), 0x0, 0x0, 0x0, 0x0) 13:30:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:52 executing program 0: close(0xffffffffffffffff) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:52 executing program 3: r0 = eventfd2(0x6, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 13:30:53 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 13:30:53 executing program 0: close(0xffffffffffffffff) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:53 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:53 executing program 3: r0 = eventfd2(0x6, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 13:30:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffffdef}}, 0x0) 13:30:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:54 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20}, 0x20}}, 0x0) r0 = socket$inet(0x2, 0x40000000003, 0x800000800000001) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0xc) 13:30:54 executing program 4: close(0xffffffffffffffff) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:54 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:55 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(r1, 0x4805, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x9, 0x5}) syz_usb_disconnect(r0) 13:30:55 executing program 1: mlockall(0x1) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x3) connect$llc(0xffffffffffffffff, 0x0, 0x0) 13:30:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) ioctl$KDFONTOP_SET(r2, 0x560f, &(0x7f00000005c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:30:55 executing program 4: close(0xffffffffffffffff) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 345.401704][ T33] usb 3-1: new high-speed USB device number 2 using dummy_hcd 13:30:56 executing program 4: close(0xffffffffffffffff) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 345.792253][ T33] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 13:30:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) ioctl$KDFONTOP_SET(r2, 0x560f, &(0x7f00000005c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:30:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 345.792426][ T33] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 345.792632][ T33] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 345.792772][ T33] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 345.866277][ T33] usb 3-1: config 0 descriptor?? [ 346.403830][ T33] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 346.403980][ T33] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 346.404116][ T33] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 13:30:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 346.404251][ T33] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 346.409984][ T33] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 346.421668][ T33] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 13:30:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 346.615360][ T33] usb 3-1: USB disconnect, device number 2 13:30:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) ioctl$KDFONTOP_SET(r2, 0x560f, &(0x7f00000005c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:30:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:58 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(r1, 0x4805, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x9, 0x5}) syz_usb_disconnect(r0) 13:30:58 executing program 5: ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:58 executing program 5: ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:30:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) ioctl$KDFONTOP_SET(r2, 0x560f, &(0x7f00000005c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 348.521644][ T5104] usb 3-1: new high-speed USB device number 3 using dummy_hcd 13:30:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:30:59 executing program 5: ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 349.063649][ T5104] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 349.075473][ T5104] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 349.088805][ T5104] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 349.098288][ T5104] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 349.173568][ T5104] usb 3-1: config 0 descriptor?? 13:30:59 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000001340)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) 13:31:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 349.708918][ T5104] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 349.716714][ T5104] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 349.724556][ T5104] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 349.732404][ T5104] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 13:31:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 349.898221][ T5104] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving 13:31:00 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x9, 0x5}) [ 350.004254][ T5104] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 [ 350.159161][ T5104] usb 3-1: USB disconnect, device number 3 13:31:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:00 executing program 1: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="0d01000009000008250592d20700006a3b010902241700fa0074980904e4ff11070103000905010200ffe000000905820236"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_disconnect(r0) ioprio_set$pid(0x0, 0x0, 0x6000) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[], 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f00000008c0)={0x2c, &(0x7f0000000600)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) 13:31:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 350.901938][ T33] usb 4-1: new high-speed USB device number 2 using dummy_hcd 13:31:01 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(r1, 0x4805, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x9, 0x5}) syz_usb_disconnect(r0) 13:31:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 351.212283][ T5104] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 351.282151][ T33] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 351.293823][ T33] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 351.310863][ T33] usb 4-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 351.320761][ T33] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:31:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 351.410119][ T33] usb 4-1: config 0 descriptor?? [ 351.481816][ T5104] usb 2-1: Using ep0 maxpacket: 8 13:31:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 351.642189][ T5104] usb 2-1: config index 0 descriptor too short (expected 5924, got 36) [ 351.650831][ T5104] usb 2-1: config 250 has an invalid interface number: 228 but max is -1 [ 351.659699][ T5104] usb 2-1: config 250 has 1 interface, different from the descriptor's value: 0 [ 351.669909][ T5104] usb 2-1: config 250 has no interface number 0 [ 351.676596][ T5104] usb 2-1: config 250 interface 228 altsetting 255 endpoint 0x1 has invalid maxpacket 65280, setting to 1024 [ 351.688520][ T5104] usb 2-1: config 250 interface 228 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 1024 [ 351.699524][ T5104] usb 2-1: config 250 interface 228 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 54 [ 351.716385][ T5104] usb 2-1: config 250 interface 228 altsetting 255 has 2 endpoint descriptors, different from the interface descriptor's value: 17 [ 351.730831][ T5104] usb 2-1: config 250 interface 228 has no altsetting 0 [ 351.929283][ T5104] usb 2-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 351.938855][ T5104] usb 2-1: New USB device strings: Mfr=0, Product=106, SerialNumber=59 [ 351.947602][ T5104] usb 2-1: Product: syz [ 351.952040][ T5104] usb 2-1: SerialNumber: syz [ 351.957661][ T33] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 351.965655][ T33] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 351.973419][ T33] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 351.981072][ T33] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 352.103620][ T5096] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 352.133081][ T5104] hub 2-1:250.228: bad descriptor, ignoring hub [ 352.139575][ T5104] hub: probe of 2-1:250.228 failed with error -5 13:31:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 352.238677][ T33] plantronics 0003:047F:FFFF.0003: No inputs registered, leaving [ 352.318146][ T33] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.3-1/input0 [ 352.476092][ T33] usb 4-1: USB disconnect, device number 2 [ 352.484447][ T5104] usblp 2-1:250.228: usblp1: USB Bidirectional printer dev 2 if 228 alt 255 proto 3 vid 0x0525 pid 0xD292 [ 352.542155][ T5096] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 352.553654][ T5096] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 352.567423][ T5096] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 352.576841][ T5096] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 352.684665][ T5096] usb 3-1: config 0 descriptor?? 13:31:03 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000280), 0xb) sendfile(r1, r1, 0x0, 0x2) [ 352.972538][ T5098] usb 2-1: USB disconnect, device number 2 [ 353.067732][ T5098] usblp1: removed 13:31:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 353.208737][ T5096] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 353.217298][ T5096] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 353.225093][ T5096] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 353.232808][ T5096] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 13:31:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 353.460890][ T5096] plantronics 0003:047F:FFFF.0004: No inputs registered, leaving [ 353.608861][ T5096] plantronics 0003:047F:FFFF.0004: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 [ 353.654916][ T5098] usb 2-1: new high-speed USB device number 3 using dummy_hcd 13:31:04 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000280), 0xb) sendfile(r1, r1, 0x0, 0x2) [ 353.724983][ T5096] usb 3-1: USB disconnect, device number 4 [ 353.913254][ T5098] usb 2-1: Using ep0 maxpacket: 8 13:31:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0x2600]}}], 0xffc8) 13:31:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 354.292512][ T5098] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 354.300401][ T5098] usb 2-1: can't read configurations, error -71 13:31:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f00000051c0), &(0x7f0000005200)='./file0\x00', 0x1000008, &(0x7f0000000280)={[{@datacow}, {@clear_cache}, {@nodatasum}, {@rescan_uuid_tree}, {}, {@space_cache_v1}]}, 0xfe, 0x51ab, &(0x7f0000005280)="$eJzs3V9oVFceB/Az+aPxDyY+xV32wX1YWcUFWRF2UdggGF2Whdn1YVnYrFlZxT+7JUgDwb5YS2lBxGCgthSKD33pS0mlUFqqBAsthYogVloUW0teWiiESsGXlpK590xmzvVmxlQbq5+PJHfO/d1z7pnhPsx3zLkTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIIRwcM3Kv+xaPb2urD7dP3bq6LLt507vP3ljaGjLlRAqtf2VvL5n+66/79+95689scPw37JtX1/ZkFnXz7PGkqads/2af/4TQuhOBujMtzs6G/pW0hOEI8UB53XgZv/o5u7BaxN3zmy8eP3QhuJTZ1bPYk9gseTX1fTctTRQ+92RHFFvN1x6laZLNOufXnA/yZMAAO7JpmptU387mr/FrbePpfWkPZC0x5N2fIcw3thYiGzcJWXzXJvWF2meA1lUWFo6z6Sev/71djXtn7STqHEP82w+NI80PWXzHEnqizVPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgIfJqx9euvTcy+u3ldWn+8dOHV22/dzp/SdvDA1tuRJCX21/JStXlv+q8w+fLtt57fiRN36zr+ftk515v7jtajg4fBIf/LE3hL0Nlek47JerQqg2F2rN8FKxcLD24M+xAAAAwKPkF7XfHfV2Fge7m9qVWpqs1P5FWVg8cLN/dHP34LWJO2c2Xrx+aMPCx6uWjDdw1/Hq7b65n0pDMI7xNx1vrh4PPVIYZ37piGme/2zmyVsXJn7777L+hfzfN3/+j6+c/A8AAMCPIf+n48yvVf6/+s7zT3UN7n2vrH8h/69tOmUh/8cZx/zfERaW/wEAAOBh9qDz/0BhnPm1yv/fnZ86f/nb46+U9S/k/03t5f+uxmnHnR/FCR/uDWFTq6kDAAAAJeL/u899tBDzevbJQZrXO2ZGe6d6blwtG6+Q/wfay//d9/2ZAQAAAAv1v7F/Hb8wNn6zrF7I/9X28v/SBz5zAAAAoF37Tvz/3PoNIyvL6oX8P9xe/l+eb/OVD1mn9+NfIUz0htAz+2AkK3wQxv9ULwAAAAD3SczpX41u/f7jwel3y44r5P+R+e//H+90ENf/N93/r7D+v6GQ3fVvqxsDAAAA8DgqruePt8fPvrmg7Pv3213/f+uXO3b9d+c/vig7fyH/H2sv/3c2bu/n9/8BAADAAvzcvv/vn4Vx5tfq/v/fDN36et3hZwfL+hfy/3h7+T9uVzQ+van4+jzTG8Ka2Qf53QRfi6c7nBQmuxsK2Quf9Ngde+SFyaUNhZqRpMfve0P49eyDY0lhdSyMJ4WZVXnhbFK4HAv59VAvvJ4UpuKV9sKqfLpp4a1YyBdYTMYVFCvqSyKSHrfLeswW7trjev3kAAAAj5UYnvMs293cDGmUnay0OmB5qwM6Wh3Q2eqAruSA9MCy/WG4uRD3v7jtd7evPPHm06FEIf+fbS//x5diSbYpW/8f4vr//HsN6+v/h2OhLylMxkI1vWNANZ4jC7sn4jn6qnmPmTX1AgAAADzS4ucCnYs8DwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH5g7/6D7KrqA4Cf/f0jm91FHAFJNYqA6ZDNJjFKK1MC1UFxpi4OdZw60UR2g9ssJCZhICnthEA7U5hUVKa1o0NDHUdpkUY6jlK1pEyBcaRTm7ZMxWhl/EFtaxnGSodSm87be8/d+87dm/dCdiFLP58/9p33vufnfT/2nXvvOxcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD/h38ZWPMb+1f89Py6+PfPuOHDewcuve+jWw8c3bRpw5EQJmYf78jCHYMrui785sBlj+3f+flzp/rvP9Cbl8vjYVnjT2d+55ai1uUhfLEjhO40sHooC/Tk94difSuGQjgtzAWKElODWYm04fDQQAgHw1ygqOr+gRCGSoErjzz4wIFG4o6BEM4NIfSlbXy7L2tjIA2c15sFBtPA9u4s8F/HMkXgS51ZAE5afDMUL/pDE80ZRucvV/P661mwjr240uF1xcRofb4fX7LInSrpTR+YOKmnrVIdi6Ly9jjs3bYE3m2V7Xy7p638RSr/hnJsLtQXOientm65bmZ3fKQzjI111dW0SM/z40/feNWJpJfM6zB2YHRBXofP3vme68+afMuNt24/54m177vg6Ml2s27zLra+kL/mlszzGG30ebIE3n6Vb0krfekKIfzcB7tv6vrtI5+qi1fm/6PHn//Hl3O87WzKHWt9bjibm8dHhmLiqeFsbg4AAABLxlLYa/qjs1/xe6s61zxeV19l/r+yveP/8ZB/PpnPRns4hI2ziZtHQjhz9vEscHds7gMjIbxmNjXRHLgkCRwO4azZxKqiqqREfyyxMgk8OZwHNiaBh2NgIgl8OgZuTwK3xMChJHBVDBxOApfGQJhuHsfPD+fjaDswEAObs414KJ6F8JPh2Fqyrb5VVAUAALBA8tlhT/Pd0rkOJ5shTi8PDbTKEM/Ars3Ql9SQzmCLaVVtDd2tauhsVUMx7n3HH36l5o5WNVdOw+hoznDpK/7w/BVfu+ELoUZl/j9+/Pl/3zwd6agc/w/hitm/MXdnHpkp4psnmjIAAAAAJ2HtG2a+9idnv+nNdfHK/H9je+f/x30iXaXM4dG4G2LbSAjjzYGs2jdXA9lR72V5AAAAAJaC4nh8cSx8Or/NTtFO59PV/BMnmD8e+N84b/5fCpOnb/vBUxvq+luZ/0+0d/7/YPNt1omHYy8+NhJCfynwSOxlIzBrZQx89+LmQD7+h+MGuC1WlZ+YUFR1WyyxOQbGk8DBuhLfKEqc2RzIn6yi8ZuLcUznJUoBAAAAeMHF3QHxuHw8///Ctd/70KaP7/1cXbnK/H/ziZ3/PzsPrpzeP7MshDXdIXSlPwx4dDBbGDAGhjryxFcHs7q60qpuGgzhosbA0qqeyNf/707XGDwykFUVA2e+9rNPn9dIfGoghDXlwGPvvWt2x8juJFA0/qsDIby6Mdq08S/0Z433pI3/QX8IryoFiqo+0B9Co7HetKoH+/LrGKRV/VlfCKeXAkVVb+wLYU8AYImK/0onyw/u2rN325aZmamdi5iI+/AHwtbpmamxq7bPTPbV9Gky6XPTMkY3VcfU2ebYj+ZLFN1z+dhIO+nid4Lj5b7k+/ErJw7m9+N3oZ7Zca7rabq7Ph3y68+pNpEO6cUY8mC5krknsVJ/zN8bloX+63ZN7Ry7Ycvu3TvXZn/bzb4u+xsPM2Xbam26rQbn61sbL492F0N/vtuq6TJXa3Zfs2PNrj17V09fs+Xqqaunrn3D+LrxdevHN7zpwjWNUY1nf1sM9fz5qk6Geuyu6hDavQbU8x3qK7tLlbwQnxoSEhJLLbHl4q/+5b1nfWJZ3cdPZf6/4/jz//ipEz/58/UZ6o7/j8bD/Nnjc4f5N8fAwXaP/4/WHc0vTgxYmQT2xcA+h/kBAAB4aYi7G+PezLhXuuem1WN//MlHnqwrV5n/72vv9/8LtP5/sXT95XXL/K+KJcbr1v9Pl/kv1v/fV7f+f7rMf7H+/8EXYf3/64pAskl+Yv1/AADgpeCFW/+/5fL+6QUCKhlaLu+fXiCgkqHlMv7tXiDghNf/f/tzr+u55iOvviXUqMz/b29v/m/hfgAAADh13HVkQ8eD//o/D9XFK/P/g+3N/1/49f9C3fn/K+sCE3ULA1r/DwAAgCWqbv2/9a/78ebP/WzFD+vKVeb/h9qb/8fTLjqbcsdanxvO1rQL6Zp2Tw0XPxkAAACApaEzjI21u6Jp08qolzz/Nh/PlwI9Xrrsr758zT8+8tb39tfVV5n/H25v/t/0u4xn73zP9WdNvuXG527dfs4Ta993wdG54/8AAADA4ml3vwQAAAAAAAAAAAAAAPDie3rv5Lv++ew7P1MXr/z+P1wx+3jd7//jdf/i7wte3pQ71tp6/b/8/pXvuHfP7JKFjw6HcE45sG3/ttNCfm3+88uBBzatOqOR2J+W+Mp3Lv1BI/H+NPC21S97ppG4KAlsjosknpUG4lUVn1meBOLyin+fBuL2OJQGevPA7y7PxtGRbqsfDWXbqiPdVo8PhTBSChTb6otDWRsd6QDvSALFAD+UBuIAfyUPdKa9undZ1qsYGIpF/2hZ1isAAE5Z8VtgT9g6PTM1Hr/Cx9tXdjffRk1Llt1UrbajzeaP5kuT3XP52Eg76a70u+jctcZ7Ql9jCGsrX1fLWTpmR7kwtbTYdC+vGXKr1d7a/XX2iW663voRDWQjGrtq+8xkT8uBr2+dZV13yyxrK5OdcpbO2U3aRi1t9KWNEbW5bdrocrzfGcbGupJcvxiDo6HJQr0iyuv81b0Kynn2Tb7xb75x7Nihuvoq8//R9ub/feVxPZNfDGBfvLLezSMhnNnmiAAAAIB2fevL/7Ru+yd+55709ort1956weCPLq4rV5n/r2xv/h93jOWHgrO9HYfj9f+L+f9oFrg7NveBkRBeM5uaiCWyC+pfHkuMZ4G74w6TVbHE5onmqvpj4FASeHI4DxxOAg/HQL6X4rMh35XzkeEQNsymrmgusSOWGE0C74yBlUlgLAbGk8DyGNiYBP59eR6YSAJfj4Ew3byt/ny5vSsAAMDzkM+zeprvhnSed6i7VYaOVhkGW2XobJWhr1WGulHE+/fFDD3JySsdpUw9aa0DSS2VDPFi+Cfcr0qG8I3mnGnBStPx/IPifIOO5gz/dtnrv33erlXtX/9/vL35/2Dzbdb6w3H+P3f9vyzwSOzex+Kp4ytj4LsXNwfyHQMPx8nubUVVE3mJfNJ+WyyxMQZWJoEdMbAxCWy+Ig8cPKM5kM+0i8ZvLhqfzkuUAgAAAPCCizsI4m6aOP//0/+++3MH/uHav64rV5n/b2xv/h/bW1Zu7Jai1uUhfLFjrjdFYPVQFoj7MYbiz+NXDIVwWmkHR1FiajAr0Zs0HB4ayH6h3ptWdf9AtsZAvH/lkQcfONBI3DEQwrmlvS9FG9/uy9oYSAPn9WaBwTSwvTsLxD0/ReBLnVkATlqxVzC+oPJTXQqj85eref29VK4Jmg6vsg90nnzz/eZqsfSlD+T7VAsn9rRVqmNRVN4eh73bluK7bdS7rfxFKv+Gcmwu1Bc6J6e2brluZnd8pPxL1opFep7Lv1JtJ70Ar8N9z7+3rfWlHRhPPj7G5y83/+uwI1b37J3vuf6sybfceOv2c55Y+74LjrbdjRrxh8Lv/uTLRsubd7H1hfw1t+Q+TyZ8nizFfwMrPW2NGexTv//V//jp4z+ri1fm/xPtzf+7k9tZz8aNuWskhNeXNu6jcfP/8kj2OVgKZJ+Sp1cD2SH37w3XfnICAADAQit2dxT7C6bz2+yE8HSeXM0/cYL54/6KjfPmb7ffW29+aP8P/+6Or9TFK/P/zcef//cn3XT83/F/Fonj//M61XdF96cP7DupXdGV6lgUjv/P61R/tzn+Py/H/x3/n4/j/y04/j+vU/1pq3xL2uFLVwjh6++/8+33bP+18+rilfn/jvbm/9b/m3/RvmL9v8116//tqFv/b5/1/wAAgEVVs9BcOs+rrN5XyZCu3lfJ0HKBwJZLDFr/74TX/3vrO//3+mOvuGRnqFGZ/+9rb/4fXw7Lyq0vlfX/Vl5RU9XtMbDDwoAAAACciup2EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDievcvPLl8029eOF0X//4ZN3x478Cl931064GjmzZtOBJClrUjC3cMrui68JsDlz22f+fnz53qv/9AX16uJ789uyl3rPW54RAOlh4Ziomnhht35gJXvuPePd2NxKPDIZxTDmzbv+20RuLTwyGcXw48sGnVGY3E/rTEV75z6Q8aifengbetftkzjcRFeaAj7e4nl2fd7Ui7e2B5CCOlQNHdX1/eXFXRxmV5oDNt4zNDWRsxMBSLfnwoayMGZmKJ6f4Q1nSH0JVW9bW+rKqutKq/6Muq6kqr+q2+EC4KIXSnVX2nN6uqOx353/ZmVcXAma/97NPnNRIHe0NYUw489t67NjQSH0oCRePv6g3h1Y2XTNr4fT1Z4z1p43f0hPCqEEJvWuI/u7MSvWmJJ7pDOL0UKBr/YHcIewIvCfHDZ7L84K49e7dtmZmZ2rmIid68rYGwdXpmauyq7TOTfUmf6nSU0sduOn78eI4+feNVjdt7Lh8baSfdnZfrme3yup6mu+sXqvftOtHex34NliuZez4q9cf8vWFZ6L9u19TOsRu27N69c232t93s67K/XXk021ZrF2pbdbYoHz3fbXV+uZI1u6/ZsWbXnr2rp6/ZcvXU1VPXvmF83fi69eMb3nThmsaoxrO/CzHUu44fX4yhvrK7VMkL8QEgISGx1BKdTZ9u46f6P73KF/25jvaEvtkP6Mq0opylY3aUCzHoS6rxrkUadGVKUhnR2srEoZJlXess6yuTibksA1mW2e91lclhuabO2U0a73eGsbHazTLafLe8eX88z+Zt1+P5pms3DQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/B87cCAAAAAAAOT/2ghVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV2IEDAQAAAAAg/9dGqKqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqsIOHAsAAAAACPO3DqNnAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBSAAAA//+3Rsqd") open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r0 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x280404) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)) 13:31:05 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(r1, 0x4805, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x9, 0x5}) syz_usb_disconnect(r0) 13:31:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 355.473167][ T5093] usb 3-1: new high-speed USB device number 5 using dummy_hcd 13:31:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 355.858090][ T5093] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 355.869681][ T5093] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 355.883367][ T5093] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 355.892914][ T5093] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 355.956266][ T5093] usb 3-1: config 0 descriptor?? 13:31:06 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 356.479360][ T5093] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 356.487502][ T5093] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 356.495438][ T5093] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 356.503310][ T5093] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 13:31:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 356.688843][ T5093] plantronics 0003:047F:FFFF.0005: No inputs registered, leaving 13:31:07 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 356.814549][ T5093] plantronics 0003:047F:FFFF.0005: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 13:31:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 356.925799][ T5093] usb 3-1: USB disconnect, device number 5 13:31:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:07 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:08 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(r1, 0x4805, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x9, 0x5}) 13:31:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:08 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 13:31:09 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 358.791785][ T5096] usb 3-1: new high-speed USB device number 6 using dummy_hcd 13:31:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 359.231896][ T5096] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 359.243206][ T5096] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 359.256689][ T5096] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 359.266088][ T5096] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.375188][ T5096] usb 3-1: config 0 descriptor?? 13:31:09 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:10 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fchdir(r0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0xa0e40, 0x408) 13:31:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 359.943452][ T5096] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 359.951172][ T5096] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 359.959030][ T5096] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 359.967029][ T5096] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 360.127407][ T5096] plantronics 0003:047F:FFFF.0006: No inputs registered, leaving 13:31:10 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 360.187921][ T5096] plantronics 0003:047F:FFFF.0006: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 [ 360.340984][ T5096] usb 3-1: USB disconnect, device number 6 13:31:11 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 13:31:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0x2600]}}], 0xffc8) 13:31:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 13:31:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:12 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(r1, 0x4805, 0x0) 13:31:12 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:12 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 13:31:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 360.942843][ T5653] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 13:31:13 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 362.494324][ T5668] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 362.601673][ T5098] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 363.101679][ T5098] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 363.113133][ T5098] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 363.126608][ T5098] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 363.136058][ T5098] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 363.215409][ T5098] usb 3-1: config 0 descriptor?? 13:31:13 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 13:31:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 13:31:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 363.716725][ T5098] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 363.726632][ T5098] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 363.735245][ T5098] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 363.743047][ T5098] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 363.867869][ T5098] plantronics 0003:047F:FFFF.0007: No inputs registered, leaving [ 363.886495][ T5685] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 363.945848][ T5098] plantronics 0003:047F:FFFF.0007: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 [ 363.986164][ T5098] usb 3-1: USB disconnect, device number 7 13:31:15 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hiddev(0x0, 0x0, 0x0) 13:31:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:15 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 13:31:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 365.315444][ T5703] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 365.539035][ T5098] usb 3-1: new high-speed USB device number 8 using dummy_hcd 13:31:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 365.934193][ T5098] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 365.948579][ T5098] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 365.962746][ T5098] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 365.972191][ T5098] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 366.064128][ T5098] usb 3-1: config 0 descriptor?? 13:31:16 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb) socket(0x0, 0x0, 0x0) 13:31:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0x4, 0x3, 0x8, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 366.548842][ T5098] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 366.561775][ T5098] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 366.570020][ T5098] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 366.577896][ T5098] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 13:31:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 366.823860][ T5098] plantronics 0003:047F:FFFF.0008: No inputs registered, leaving [ 366.856990][ T5719] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 366.888717][ T5098] plantronics 0003:047F:FFFF.0008: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 [ 366.997446][ T5098] usb 3-1: USB disconnect, device number 8 13:31:18 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x50, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x14, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 13:31:18 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:18 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb) 13:31:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:18 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x50, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x14, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) [ 368.212875][ T5736] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 368.321785][ T5096] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 368.802425][ T5096] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 368.820394][ T5096] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 368.835504][ T5096] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 368.844932][ T5096] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 368.940572][ T5096] usb 3-1: config 0 descriptor?? [ 369.456780][ T5096] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 369.464598][ T5096] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 369.472367][ T5096] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 369.480028][ T5096] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 369.503977][ T5096] plantronics 0003:047F:FFFF.0009: No inputs registered, leaving [ 369.545754][ T5096] plantronics 0003:047F:FFFF.0009: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.2-1/input0 [ 369.658817][ T5096] usb 3-1: USB disconnect, device number 9 13:31:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0x2600]}}], 0xffc8) 13:31:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x50, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x14, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 13:31:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:20 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) 13:31:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:20 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 13:31:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0x5, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:21 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:21 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000000)=0x2) [ 370.332750][ T5749] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 13:31:21 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 371.153990][ T5764] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 371.199342][ T5766] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x50, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x14, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 13:31:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 371.431672][ T5093] usb 3-1: new high-speed USB device number 10 using dummy_hcd 13:31:22 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) [ 371.802386][ T5093] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 371.813824][ T5093] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 371.827260][ T5093] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 371.836689][ T5093] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 371.911980][ T5093] usb 3-1: config 0 descriptor?? [ 371.959742][ T5769] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x50, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x14, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 13:31:22 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) [ 372.482494][ T5093] usbhid 3-1:0.0: can't add hid device: -71 [ 372.489119][ T5093] usbhid: probe of 3-1:0.0 failed with error -71 [ 372.563818][ T5093] usb 3-1: USB disconnect, device number 10 13:31:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x50, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x14, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) [ 372.756635][ T5779] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:23 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) 13:31:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:23 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 13:31:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:24 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000000)=0x2) [ 373.772171][ T5794] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:24 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 374.041882][ T5098] usb 3-1: new high-speed USB device number 11 using dummy_hcd 13:31:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 374.163116][ T5798] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 374.462862][ T5098] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 374.484429][ T5098] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 374.497927][ T5098] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 374.507355][ T5098] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 374.713591][ T5098] usb 3-1: config 0 descriptor?? [ 374.734093][ T5802] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:25 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000000)=0x2) 13:31:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 375.327029][ T5098] usbhid 3-1:0.0: can't add hid device: -71 [ 375.333760][ T5098] usbhid: probe of 3-1:0.0 failed with error -71 [ 375.395734][ T5808] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 375.432377][ T5098] usb 3-1: USB disconnect, device number 11 13:31:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0x2600]}}], 0xffc8) 13:31:27 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:27 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) 13:31:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:27 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 13:31:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 377.054822][ T5817] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 377.087503][ T5820] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:27 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 377.323569][ T5098] usb 3-1: new high-speed USB device number 12 using dummy_hcd 13:31:28 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) [ 377.703225][ T5827] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 377.732700][ T5098] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 377.749248][ T5098] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 377.766718][ T5098] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 377.776592][ T5098] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 377.892413][ T5098] usb 3-1: config 0 descriptor?? 13:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x4c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x13, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:28 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:28 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@RTM_NEWMDB={0x17}, 0x7ffff000}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, r1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) [ 378.078611][ T5833] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 378.447586][ T5098] usbhid 3-1:0.0: can't add hid device: -71 [ 378.463907][ T5098] usbhid: probe of 3-1:0.0 failed with error -71 13:31:29 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5002, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) [ 378.561759][ T5098] usb 3-1: USB disconnect, device number 12 [ 378.652050][ T5835] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 378.954186][ T5843] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 13:31:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:29 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) [ 378.954990][ T5841] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 379.775774][ T5850] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000280), 0xb) sendfile(r2, r2, 0x0, 0x401) 13:31:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:30 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 380.039671][ T5855] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 380.092405][ T5858] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 380.351779][ T5093] usb 3-1: new high-speed USB device number 13 using dummy_hcd 13:31:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) [ 380.614638][ T5861] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 380.762467][ T5093] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 380.774065][ T5093] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 380.790849][ T5093] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 380.800516][ T5093] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:31:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 380.815188][ T5868] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:31 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 380.895587][ T5093] usb 3-1: config 0 descriptor?? 13:31:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 381.234002][ T5872] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) 13:31:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x2}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 381.492273][ T5093] usbhid 3-1:0.0: can't add hid device: -71 [ 381.498845][ T5093] usbhid: probe of 3-1:0.0 failed with error -71 13:31:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 381.573885][ T5093] usb 3-1: USB disconnect, device number 13 [ 381.629084][ T5876] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:32 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x75, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup2(r1, r0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:31:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 381.937420][ T5879] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) 13:31:32 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x2}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 382.432625][ T5884] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 382.544377][ T5887] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:31:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) [ 382.792604][ T5896] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:33 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x2}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 383.044503][ T5093] usb 3-1: new high-speed USB device number 14 using dummy_hcd 13:31:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x75, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup2(r1, r0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 383.129832][ T5899] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) 13:31:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 383.482140][ T5093] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 383.493517][ T5093] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 383.509407][ T5093] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 383.521507][ T5093] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 383.634352][ T5093] usb 3-1: config 0 descriptor?? 13:31:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 383.667156][ T5906] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x4, "66c3"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) [ 384.052578][ T5914] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 384.184150][ T5093] usbhid 3-1:0.0: can't add hid device: -71 [ 384.190805][ T5093] usbhid: probe of 3-1:0.0 failed with error -71 [ 384.243107][ T5093] usb 3-1: USB disconnect, device number 14 13:31:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x2}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 384.553080][ T5919] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:35 executing program 1: syz_mount_image$btrfs(&(0x7f00000051c0), &(0x7f0000005200)='./file0\x00', 0x1000008, &(0x7f0000000280)={[{@datacow}, {@clear_cache}, {@nodatasum}, {@rescan_uuid_tree}, {}, {@space_cache_v1}]}, 0xfe, 0x51ab, &(0x7f0000005280)="$eJzs3V9oVFceB/Az+aPxDyY+xV32wX1YWcUFWRF2UdggGF2Whdn1YVnYrFlZxT+7JUgDwb5YS2lBxGCgthSKD33pS0mlUFqqBAsthYogVloUW0teWiiESsGXlpK590xmzvVmxlQbq5+PJHfO/d1z7pnhPsx3zLkTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIIRwcM3Kv+xaPb2urD7dP3bq6LLt507vP3ljaGjLlRAqtf2VvL5n+66/79+95689scPw37JtX1/ZkFnXz7PGkqads/2af/4TQuhOBujMtzs6G/pW0hOEI8UB53XgZv/o5u7BaxN3zmy8eP3QhuJTZ1bPYk9gseTX1fTctTRQ+92RHFFvN1x6laZLNOufXnA/yZMAAO7JpmptU387mr/FrbePpfWkPZC0x5N2fIcw3thYiGzcJWXzXJvWF2meA1lUWFo6z6Sev/71djXtn7STqHEP82w+NI80PWXzHEnqizVPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgIfJqx9euvTcy+u3ldWn+8dOHV22/dzp/SdvDA1tuRJCX21/JStXlv+q8w+fLtt57fiRN36zr+ftk515v7jtajg4fBIf/LE3hL0Nlek47JerQqg2F2rN8FKxcLD24M+xAAAAwKPkF7XfHfV2Fge7m9qVWpqs1P5FWVg8cLN/dHP34LWJO2c2Xrx+aMPCx6uWjDdw1/Hq7b65n0pDMI7xNx1vrh4PPVIYZ37piGme/2zmyVsXJn7777L+hfzfN3/+j6+c/A8AAMCPIf+n48yvVf6/+s7zT3UN7n2vrH8h/69tOmUh/8cZx/zfERaW/wEAAOBh9qDz/0BhnPm1yv/fnZ86f/nb46+U9S/k/03t5f+uxmnHnR/FCR/uDWFTq6kDAAAAJeL/u899tBDzevbJQZrXO2ZGe6d6blwtG6+Q/wfay//d9/2ZAQAAAAv1v7F/Hb8wNn6zrF7I/9X28v/SBz5zAAAAoF37Tvz/3PoNIyvL6oX8P9xe/l+eb/OVD1mn9+NfIUz0htAz+2AkK3wQxv9ULwAAAAD3SczpX41u/f7jwel3y44r5P+R+e//H+90ENf/N93/r7D+v6GQ3fVvqxsDAAAA8DgqruePt8fPvrmg7Pv3213/f+uXO3b9d+c/vig7fyH/H2sv/3c2bu/n9/8BAADAAvzcvv/vn4Vx5tfq/v/fDN36et3hZwfL+hfy/3h7+T9uVzQ+van4+jzTG8Ka2Qf53QRfi6c7nBQmuxsK2Quf9Ngde+SFyaUNhZqRpMfve0P49eyDY0lhdSyMJ4WZVXnhbFK4HAv59VAvvJ4UpuKV9sKqfLpp4a1YyBdYTMYVFCvqSyKSHrfLeswW7trjev3kAAAAj5UYnvMs293cDGmUnay0OmB5qwM6Wh3Q2eqAruSA9MCy/WG4uRD3v7jtd7evPPHm06FEIf+fbS//x5diSbYpW/8f4vr//HsN6+v/h2OhLylMxkI1vWNANZ4jC7sn4jn6qnmPmTX1AgAAADzS4ucCnYs8DwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH5g7/6D7KrqA4Cf/f0jm91FHAFJNYqA6ZDNJjFKK1MC1UFxpi4OdZw60UR2g9ssJCZhICnthEA7U5hUVKa1o0NDHUdpkUY6jlK1pEyBcaRTm7ZMxWhl/EFtaxnGSodSm87be8/d+87dm/dCdiFLP58/9p33vufnfT/2nXvvOxcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD/h38ZWPMb+1f89Py6+PfPuOHDewcuve+jWw8c3bRpw5EQJmYf78jCHYMrui785sBlj+3f+flzp/rvP9Cbl8vjYVnjT2d+55ai1uUhfLEjhO40sHooC/Tk94difSuGQjgtzAWKElODWYm04fDQQAgHw1ygqOr+gRCGSoErjzz4wIFG4o6BEM4NIfSlbXy7L2tjIA2c15sFBtPA9u4s8F/HMkXgS51ZAE5afDMUL/pDE80ZRucvV/P661mwjr240uF1xcRofb4fX7LInSrpTR+YOKmnrVIdi6Ly9jjs3bYE3m2V7Xy7p638RSr/hnJsLtQXOientm65bmZ3fKQzjI111dW0SM/z40/feNWJpJfM6zB2YHRBXofP3vme68+afMuNt24/54m177vg6Ml2s27zLra+kL/mlszzGG30ebIE3n6Vb0krfekKIfzcB7tv6vrtI5+qi1fm/6PHn//Hl3O87WzKHWt9bjibm8dHhmLiqeFsbg4AAABLxlLYa/qjs1/xe6s61zxeV19l/r+yveP/8ZB/PpnPRns4hI2ziZtHQjhz9vEscHds7gMjIbxmNjXRHLgkCRwO4azZxKqiqqREfyyxMgk8OZwHNiaBh2NgIgl8OgZuTwK3xMChJHBVDBxOApfGQJhuHsfPD+fjaDswEAObs414KJ6F8JPh2Fqyrb5VVAUAALBA8tlhT/Pd0rkOJ5shTi8PDbTKEM/Ars3Ql9SQzmCLaVVtDd2tauhsVUMx7n3HH36l5o5WNVdOw+hoznDpK/7w/BVfu+ELoUZl/j9+/Pl/3zwd6agc/w/hitm/MXdnHpkp4psnmjIAAAAAJ2HtG2a+9idnv+nNdfHK/H9je+f/x30iXaXM4dG4G2LbSAjjzYGs2jdXA9lR72V5AAAAAJaC4nh8cSx8Or/NTtFO59PV/BMnmD8e+N84b/5fCpOnb/vBUxvq+luZ/0+0d/7/YPNt1omHYy8+NhJCfynwSOxlIzBrZQx89+LmQD7+h+MGuC1WlZ+YUFR1WyyxOQbGk8DBuhLfKEqc2RzIn6yi8ZuLcUznJUoBAAAAeMHF3QHxuHw8///Ctd/70KaP7/1cXbnK/H/ziZ3/PzsPrpzeP7MshDXdIXSlPwx4dDBbGDAGhjryxFcHs7q60qpuGgzhosbA0qqeyNf/707XGDwykFUVA2e+9rNPn9dIfGoghDXlwGPvvWt2x8juJFA0/qsDIby6Mdq08S/0Z433pI3/QX8IryoFiqo+0B9Co7HetKoH+/LrGKRV/VlfCKeXAkVVb+wLYU8AYImK/0onyw/u2rN325aZmamdi5iI+/AHwtbpmamxq7bPTPbV9Gky6XPTMkY3VcfU2ebYj+ZLFN1z+dhIO+nid4Lj5b7k+/ErJw7m9+N3oZ7Zca7rabq7Ph3y68+pNpEO6cUY8mC5krknsVJ/zN8bloX+63ZN7Ry7Ycvu3TvXZn/bzb4u+xsPM2Xbam26rQbn61sbL492F0N/vtuq6TJXa3Zfs2PNrj17V09fs+Xqqaunrn3D+LrxdevHN7zpwjWNUY1nf1sM9fz5qk6Geuyu6hDavQbU8x3qK7tLlbwQnxoSEhJLLbHl4q/+5b1nfWJZ3cdPZf6/4/jz//ipEz/58/UZ6o7/j8bD/Nnjc4f5N8fAwXaP/4/WHc0vTgxYmQT2xcA+h/kBAAB4aYi7G+PezLhXuuem1WN//MlHnqwrV5n/72vv9/8LtP5/sXT95XXL/K+KJcbr1v9Pl/kv1v/fV7f+f7rMf7H+/8EXYf3/64pAskl+Yv1/AADgpeCFW/+/5fL+6QUCKhlaLu+fXiCgkqHlMv7tXiDghNf/f/tzr+u55iOvviXUqMz/b29v/m/hfgAAADh13HVkQ8eD//o/D9XFK/P/g+3N/1/49f9C3fn/K+sCE3ULA1r/DwAAgCWqbv2/9a/78ebP/WzFD+vKVeb/h9qb/8fTLjqbcsdanxvO1rQL6Zp2Tw0XPxkAAACApaEzjI21u6Jp08qolzz/Nh/PlwI9Xrrsr758zT8+8tb39tfVV5n/H25v/t/0u4xn73zP9WdNvuXG527dfs4Ta993wdG54/8AAADA4ml3vwQAAAAAAAAAAAAAAPDie3rv5Lv++ew7P1MXr/z+P1wx+3jd7//jdf/i7wte3pQ71tp6/b/8/pXvuHfP7JKFjw6HcE45sG3/ttNCfm3+88uBBzatOqOR2J+W+Mp3Lv1BI/H+NPC21S97ppG4KAlsjosknpUG4lUVn1meBOLyin+fBuL2OJQGevPA7y7PxtGRbqsfDWXbqiPdVo8PhTBSChTb6otDWRsd6QDvSALFAD+UBuIAfyUPdKa9undZ1qsYGIpF/2hZ1isAAE5Z8VtgT9g6PTM1Hr/Cx9tXdjffRk1Llt1UrbajzeaP5kuT3XP52Eg76a70u+jctcZ7Ql9jCGsrX1fLWTpmR7kwtbTYdC+vGXKr1d7a/XX2iW663voRDWQjGrtq+8xkT8uBr2+dZV13yyxrK5OdcpbO2U3aRi1t9KWNEbW5bdrocrzfGcbGupJcvxiDo6HJQr0iyuv81b0Kynn2Tb7xb75x7Nihuvoq8//R9ub/feVxPZNfDGBfvLLezSMhnNnmiAAAAIB2fevL/7Ru+yd+55709ort1956weCPLq4rV5n/r2xv/h93jOWHgrO9HYfj9f+L+f9oFrg7NveBkRBeM5uaiCWyC+pfHkuMZ4G74w6TVbHE5onmqvpj4FASeHI4DxxOAg/HQL6X4rMh35XzkeEQNsymrmgusSOWGE0C74yBlUlgLAbGk8DyGNiYBP59eR6YSAJfj4Ew3byt/ny5vSsAAMDzkM+zeprvhnSed6i7VYaOVhkGW2XobJWhr1WGulHE+/fFDD3JySsdpUw9aa0DSS2VDPFi+Cfcr0qG8I3mnGnBStPx/IPifIOO5gz/dtnrv33erlXtX/9/vL35/2Dzbdb6w3H+P3f9vyzwSOzex+Kp4ytj4LsXNwfyHQMPx8nubUVVE3mJfNJ+WyyxMQZWJoEdMbAxCWy+Ig8cPKM5kM+0i8ZvLhqfzkuUAgAAAPCCizsI4m6aOP//0/+++3MH/uHav64rV5n/b2xv/h/bW1Zu7Jai1uUhfLFjrjdFYPVQFoj7MYbiz+NXDIVwWmkHR1FiajAr0Zs0HB4ayH6h3ptWdf9AtsZAvH/lkQcfONBI3DEQwrmlvS9FG9/uy9oYSAPn9WaBwTSwvTsLxD0/ReBLnVkATlqxVzC+oPJTXQqj85eref29VK4Jmg6vsg90nnzz/eZqsfSlD+T7VAsn9rRVqmNRVN4eh73bluK7bdS7rfxFKv+Gcmwu1Bc6J6e2brluZnd8pPxL1opFep7Lv1JtJ70Ar8N9z7+3rfWlHRhPPj7G5y83/+uwI1b37J3vuf6sybfceOv2c55Y+74LjrbdjRrxh8Lv/uTLRsubd7H1hfw1t+Q+TyZ8nizFfwMrPW2NGexTv//V//jp4z+ri1fm/xPtzf+7k9tZz8aNuWskhNeXNu6jcfP/8kj2OVgKZJ+Sp1cD2SH37w3XfnICAADAQit2dxT7C6bz2+yE8HSeXM0/cYL54/6KjfPmb7ffW29+aP8P/+6Or9TFK/P/zcef//cn3XT83/F/Fonj//M61XdF96cP7DupXdGV6lgUjv/P61R/tzn+Py/H/x3/n4/j/y04/j+vU/1pq3xL2uFLVwjh6++/8+33bP+18+rilfn/jvbm/9b/m3/RvmL9v8116//tqFv/b5/1/wAAgEVVs9BcOs+rrN5XyZCu3lfJ0HKBwJZLDFr/74TX/3vrO//3+mOvuGRnqFGZ/+9rb/4fXw7Lyq0vlfX/Vl5RU9XtMbDDwoAAAACciup2EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDievcvPLl8029eOF0X//4ZN3x478Cl931064GjmzZtOBJClrUjC3cMrui68JsDlz22f+fnz53qv/9AX16uJ789uyl3rPW54RAOlh4Ziomnhht35gJXvuPePd2NxKPDIZxTDmzbv+20RuLTwyGcXw48sGnVGY3E/rTEV75z6Q8aifengbetftkzjcRFeaAj7e4nl2fd7Ui7e2B5CCOlQNHdX1/eXFXRxmV5oDNt4zNDWRsxMBSLfnwoayMGZmKJ6f4Q1nSH0JVW9bW+rKqutKq/6Muq6kqr+q2+EC4KIXSnVX2nN6uqOx353/ZmVcXAma/97NPnNRIHe0NYUw489t67NjQSH0oCRePv6g3h1Y2XTNr4fT1Z4z1p43f0hPCqEEJvWuI/u7MSvWmJJ7pDOL0UKBr/YHcIewIvCfHDZ7L84K49e7dtmZmZ2rmIid68rYGwdXpmauyq7TOTfUmf6nSU0sduOn78eI4+feNVjdt7Lh8baSfdnZfrme3yup6mu+sXqvftOtHex34NliuZez4q9cf8vWFZ6L9u19TOsRu27N69c232t93s67K/XXk021ZrF2pbdbYoHz3fbXV+uZI1u6/ZsWbXnr2rp6/ZcvXU1VPXvmF83fi69eMb3nThmsaoxrO/CzHUu44fX4yhvrK7VMkL8QEgISGx1BKdTZ9u46f6P73KF/25jvaEvtkP6Mq0opylY3aUCzHoS6rxrkUadGVKUhnR2srEoZJlXess6yuTibksA1mW2e91lclhuabO2U0a73eGsbHazTLafLe8eX88z+Zt1+P5pms3DQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/B87cCAAAAAAAOT/2ghVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV2IEDAQAAAAAg/9dGqKqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqsIOHAsAAAAACPO3DqNnAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBSAAAA//+3Rsqd") r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0xca289435, &(0x7f00000019c0)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 13:31:35 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 384.868035][ T5922] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) 13:31:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x4, "66c3"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x2}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 385.564244][ T5931] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 385.635217][ T5935] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) 13:31:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x4, "66c3"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x17, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x2}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 385.877234][ T5104] usb 3-1: new high-speed USB device number 15 using dummy_hcd [ 386.297082][ T5104] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 386.308621][ T5104] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 386.327988][ T5104] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 386.337908][ T5104] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 386.393796][ T5943] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 386.435876][ T5104] usb 3-1: config 0 descriptor?? 13:31:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) 13:31:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x4, "66c3"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:37 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)) [ 387.012065][ T5104] usbhid 3-1:0.0: can't add hid device: -71 [ 387.018729][ T5104] usbhid: probe of 3-1:0.0 failed with error -71 [ 387.103174][ T5104] usb 3-1: USB disconnect, device number 15 13:31:37 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x4, "66c3"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:38 executing program 2: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)) [ 387.936838][ T5960] net_ratelimit: 3 callbacks suppressed [ 387.936901][ T5960] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 388.005042][ T5961] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:38 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x4, "66c3"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)) [ 388.690231][ T5970] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 388.729125][ T5971] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:39 executing program 2: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x75, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup2(r1, r0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="0f01ba5e3002f4660f38817800c4c245ac060f20e035020000000f22e0b90f0300000f32dfecb9950b00000f320f01cf36f08261cf7cc4c141e5d6", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 389.467983][ T5979] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:40 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 389.692949][ T5981] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:40 executing program 2: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 390.342537][ T5991] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:40 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:41 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80}, 'port0\x00', 0x1}) 13:31:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 390.672247][ T5994] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:41 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}}, 0x0) 13:31:41 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 391.161411][ T6003] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:41 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xa, 0x3, 0xa}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 391.497096][ T6005] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 391.782752][ T6009] (null): rxe_set_mtu: Set mtu to 4096 [ 391.783201][ T6009] lo speed is unknown, defaulting to 1000 [ 391.798438][ T6009] lo speed is unknown, defaulting to 1000 [ 391.805387][ T6009] lo speed is unknown, defaulting to 1000 13:31:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xa, 0x3, 0xa}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 392.286647][ T6009] infiniband syz2: set active [ 392.291772][ T6009] infiniband syz2: added lo [ 392.373075][ T5093] lo speed is unknown, defaulting to 1000 13:31:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:43 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xa, 0x3, 0xa}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 392.736372][ T6009] RDS/IB: syz2: added [ 392.740676][ T6009] smc: adding ib device syz2 with port count 1 [ 392.747246][ T6009] smc: ib device syz2 port 1 has pnetid [ 392.754972][ T6009] lo speed is unknown, defaulting to 1000 13:31:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 393.201232][ T6009] lo speed is unknown, defaulting to 1000 [ 393.325728][ T6030] net_ratelimit: 2 callbacks suppressed [ 393.325794][ T6030] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@nop, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 393.647865][ T6009] lo speed is unknown, defaulting to 1000 13:31:44 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 393.968430][ T5093] lo speed is unknown, defaulting to 1000 [ 394.187585][ T6009] lo speed is unknown, defaulting to 1000 [ 394.673989][ T6038] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 394.737232][ T6009] lo speed is unknown, defaulting to 1000 13:31:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xa, 0x3, 0xa}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 395.293390][ T6043] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 395.367098][ T6009] lo speed is unknown, defaulting to 1000 13:31:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:46 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 396.300948][ T6051] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 396.368686][ T6054] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:47 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}}, 0x0) 13:31:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:47 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x75, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup2(r1, r0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000300)={0x10001}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:31:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xa, 0x3, 0xa}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 396.842080][ T5096] usb 3-1: new high-speed USB device number 16 using dummy_hcd [ 397.242206][ T5096] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 397.252330][ T5096] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 397.265665][ T5096] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 397.281149][ T5096] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:31:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 397.283868][ T6065] syz2: rxe_newlink: already configured on lo [ 397.334697][ T6066] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 397.347439][ T5096] usb 3-1: config 0 descriptor?? 13:31:48 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000100)={0x1d, 0x0, 0x7ff}, 0x0) 13:31:48 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x75, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup2(r1, r0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000300)={0x10001}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:31:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@nop, @mptcp=@add_addr={0x1e, 0xa, 0x3, 0xa}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 397.567032][ T5096] usbhid 3-1:0.0: couldn't find an input interrupt endpoint 13:31:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c923", 0x3a}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c", 0x2e}], 0x1}}], 0x3, 0x8004) 13:31:48 executing program 0: syz_usb_connect$printer(0x0, 0x36, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f00000008c0)={0x2c, &(0x7f0000000600)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) [ 398.265922][ T1211] ieee802154 phy0 wpan0: encryption failed: -22 [ 398.273252][ T1211] ieee802154 phy1 wpan1: encryption failed: -22 13:31:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:49 executing program 1: bpf$MAP_CREATE(0x22, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:31:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 398.836615][ T6092] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:49 executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 13:31:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:49 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 399.407052][ T5098] usb 3-1: USB disconnect, device number 16 13:31:50 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1c, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) [ 399.613234][ T6102] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000100)={@local, @random="aafde504c632", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "108435", 0x60, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xb, 0x3, 0xb, 0x0, @rand_addr, 0x0, "dd"}, @timestamp={0x8, 0xa}, @generic={0x0, 0x5, "66c3a1"}, @mptcp=@mp_join={0x1e, 0x3}, @md5sig={0x13, 0x12, "88fec776621905fa494466d3fa13ba3a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) 13:31:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan1\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000000240)={0x1d, r2}, 0x10) 13:31:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:50 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 400.193565][ T5093] usb 3-1: new high-speed USB device number 17 using dummy_hcd [ 400.283462][ T6114] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 13:31:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffeeb, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000390007010000000000000000027c0000040000000c00018022d0", @ANYRES64=r0], 0x24}}, 0x0) 13:31:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x13}, @NFTA_CT_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) 13:31:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000100)=@framed={{}, [@jmp={0x7, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) [ 400.649195][ T5093] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 400.662548][ T5093] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 400.676447][ T5093] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 400.685914][ T5093] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 400.775148][ T5093] usb 3-1: config 0 descriptor?? [ 400.810242][ T6122] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 13:31:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) [ 400.906985][ T5093] usbhid 3-1:0.0: couldn't find an input interrupt endpoint 13:31:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) 13:31:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000100)=@framed={{}, [@jmp={0x7, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) 13:31:51 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f0000001400)={0x14, r1, 0x9}, 0x14}}, 0x0) 13:31:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:52 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000140)='J', 0x1}], 0x1}, 0x0) 13:31:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000100)=@framed={{}, [@jmp={0x7, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) 13:31:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x3cf, 0x80c, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 13:31:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000004fb601"], 0x1c}}, 0x0) 13:31:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000100)=@framed={{}, [@jmp={0x7, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00'}, 0x90) 13:31:53 executing program 0: bpf$PROG_BIND_MAP(0x23, &(0x7f00000019c0), 0xc) 13:31:53 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0, 0x0, 0x3}}, 0x48) 13:31:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:53 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 402.991168][ T5093] usb 3-1: USB disconnect, device number 17 13:31:53 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="221eb218739de94374", 0x9, 0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @local, 0x7f}], 0x1c) 13:31:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x20, &(0x7f0000000000)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @remote}]}, &(0x7f00000000c0)=0x10) 13:31:54 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) 13:31:54 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="221eb218739de94374", 0x9, 0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:54 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 403.882168][ T5093] usb 3-1: new high-speed USB device number 18 using dummy_hcd 13:31:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x80}, 0x48) 13:31:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000140)=[@in={0x2, 0x4e22, @private=0xa010100}, @in6={0xa, 0x4e22, 0x0, @private1}]}, &(0x7f00000000c0)=0x10) 13:31:54 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) [ 404.292836][ T5093] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 404.303205][ T5093] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 404.317054][ T5093] usb 3-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 404.326488][ T5093] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:31:54 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="221eb218739de94374", 0x9, 0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) [ 404.419802][ T5093] usb 3-1: config 0 descriptor?? 13:31:55 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) [ 404.502402][ T5093] usbhid 3-1:0.0: couldn't find an input interrupt endpoint 13:31:55 executing program 4: bpf$MAP_CREATE(0x16, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:31:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, 0x0, 0x0) 13:31:55 executing program 0: r0 = socket(0x28, 0x0, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0'}, 0xb) recvfrom$unix(r2, &(0x7f0000000200)=""/194, 0xc2, 0x2, 0x0, 0x0) 13:31:55 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="221eb218739de94374", 0x9, 0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:55 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:55 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r1}, 0x10) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 13:31:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x48) 13:31:56 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="221eb218739de94374", 0x9, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:56 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:56 executing program 4: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x48) 13:31:56 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="221eb218739de94374", 0x9, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x48) 13:31:56 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14, r1, 0x400, 0x70bd25, 0x0, {}, ["", "", ""]}, 0x14}}, 0x8034) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000840), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r3, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r1, 0x100, 0x70bd28, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x9}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040004}, 0x40809) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000d00)={r2}) syz_genetlink_get_family_id$gtp(&(0x7f0000000d80), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 13:31:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x84, 0x0, &(0x7f0000000100)) [ 406.682396][ T5104] usb 3-1: USB disconnect, device number 18 13:31:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x48) 13:31:57 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="00000f0000000f000300008000000000b3"], 0x0, 0x0, 0x0, 0x0}, 0x0) 13:31:57 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="221eb218739de94374", 0x9, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:57 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), 0x4) 13:31:57 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x4040044) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) [ 407.477976][ T5104] usb 3-1: new high-speed USB device number 19 using dummy_hcd 13:31:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0}}, 0x48) 13:31:58 executing program 0: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0), 0xffffffffffffffff) [ 407.712355][ T5104] usb 3-1: device descriptor read/64, error -71 13:31:58 executing program 4: bpf$MAP_CREATE(0x10, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:31:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0}}, 0x48) [ 408.089997][ T5104] usb 3-1: new high-speed USB device number 20 using dummy_hcd 13:31:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) 13:31:58 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000007480)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="550a63c24fb5ee08c35aed1a5d3e55ff81861b8c03b9c2b21739066c2cb8d373728a630e49d994303463ad648665a94e73f2bad6d158cc0586026c5368301280a6b6f9048d6fbbda0991eb0c71915cd5b3d69eaf1121ee61036ebf47b1f87294a51db19201c497a21055058393a941724f35ce58ecce8217b0f9562b0512f6a6d255d2accb58195efbd7e20ce58a906c16cf59ffdc114fded3b39d0fd00235ea87e21455d974d6517602f09b86c798efcf0b24837e6d41fed8ca37f812a95b029a19dc", 0xc3}, {&(0x7f0000000200)="cbe712d8fc21cdbd42ed7873a693", 0xe}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)="72db5524229f9e3f5518d5310966656b6cdf77a4af408d5c0006e107e9bfaabe7d59148e4a5b95e3340daf5bee8024691531e67781d76781c9237d204baac5dcd4bd", 0x42}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000840)="f971ddf9c43b7e1169eacfbc8662c325de8fafe6b8c70cb463e9813090379bf7ca0122e809019e5b4e054373723c8c1210c2f82035da25452bf0d531e5a26d125d6324", 0x43}, {&(0x7f00000008c0)="a7ad7a04da45258e494e35a8b2a4c1c251a791ae1de7db5bc0c28c8e7e5d512cade8c1d01484e33f3c9ff14c3b448ecab513fb0b1afe7c5062001164590d5318767d167c4eed87fe64ddab3aace35b40dc38cd2b1bdbe9c99e91ce00b14ea3c4c82335f7e069255593a2aa4ccc973ea0f80f8a1e", 0x74}, {&(0x7f0000000940)="740952097d682578e83a6179eceda7bce0ad47978bd193974867897ad98bd06574fd8e06e5829d241c8f10ed9b2cbfd4c3f79c6ee069c053184dfbbc672ebf1988ff4a21afb24be415cc12cd1ca3e995810cb1af6c1e40fc5733020bfdc23d2e985165ad6054cc9d513605be199b9dc3bac1a273e7f4c3f056eabea1348672b831d66d862a459e2e9df1b47574623c1700d2cefd2fcaa18c8ff5f0ae58c914e085b88d82c1bb7bbb0f", 0xa9}, {&(0x7f0000000a00)="dd7fd216027d35cd4404db32ad2e047e4c71e0", 0x13}, {&(0x7f0000000a40)="2dec36661bbaca6987d5efa82a474e7b5ac89331ac00a95d75aea7f8e49f3d1106f8acbda38d396b6a0e9b221dfb5749b557bc4cbc1d2dc169773498d02abd5d15dc7458a220a8ffb215e6a8f3d60a1fd0c0acd0", 0x54}], 0x5}}], 0x3, 0x8004) 13:31:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @remote}, @in={0x2, 0x0, @loopback}, @in={0x2, 0x4e23, @local}], 0x30) [ 408.338384][ T5104] usb 3-1: device descriptor read/64, error -71 13:31:59 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$vsock_stream(r0, 0x0, 0x0, 0x0) [ 408.491029][ T5104] usb usb3-port1: attempt power cycle 13:31:59 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) write$vhost_msg_v2(r0, &(0x7f0000000640)={0x2, 0x0, {&(0x7f0000000740)=""/234, 0xea, 0x0, 0x0, 0x2}}, 0x4f) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000000)=""/91, 0x5b, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000280)=""/47, 0x2f, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000840)=""/211, 0xd3, 0x0, 0x0, 0x2}}, 0x48) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f00000002c0)=""/119, 0xfca2, 0x0}}, 0x48) 13:31:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) [ 408.922991][ T5104] usb 3-1: new high-speed USB device number 21 using dummy_hcd 13:31:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'hsr0\x00', 0x0}) sendto$packet(r0, &(0x7f00000009c0)="56e878d3640a92e07f0d87b5892f", 0xe, 0x0, &(0x7f0000000a80)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) 13:31:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x2, 0x3, 0x5}, 0x14}}, 0x0) [ 409.041844][ T5104] usb 3-1: device descriptor read/8, error -71 13:31:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000d00)) [ 409.332982][ T5104] usb 3-1: new high-speed USB device number 22 using dummy_hcd 13:31:59 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x14, &(0x7f00000000c0), 0x7ffff}, 0x90) [ 409.478107][ T5104] usb 3-1: device descriptor read/8, error -71 [ 409.532183][ T6266] ===================================================== [ 409.539704][ T6266] BUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 [ 409.546984][ T6266] hsr_get_node+0xa2e/0xa40 [ 409.551745][ T6266] hsr_forward_skb+0xe12/0x30e0 [ 409.556795][ T6266] hsr_dev_xmit+0x1a1/0x270 [ 409.561569][ T6266] dev_hard_start_xmit+0x247/0xa10 [ 409.566938][ T6266] __dev_queue_xmit+0x33b8/0x5130 [ 409.572209][ T6266] packet_xmit+0x9c/0x6b0 [ 409.576798][ T6266] packet_sendmsg+0x8b1d/0x9f30 13:32:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x0, @private1}, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}], 0x38) [ 409.581930][ T6266] __sys_sendto+0x735/0xa10 [ 409.586675][ T6266] __ia32_sys_sendto+0x11f/0x1c0 [ 409.591884][ T6266] __do_fast_syscall_32+0xb3/0x110 [ 409.597226][ T6266] do_fast_syscall_32+0x37/0x70 [ 409.602358][ T6266] do_SYSENTER_32+0x1f/0x30 [ 409.607075][ T6266] entry_SYSENTER_compat_after_hwframe+0x70/0x7a [ 409.613827][ T6266] [ 409.616245][ T6266] Uninit was created at: [ 409.620706][ T6266] slab_post_alloc_hook+0x129/0xa70 [ 409.626161][ T6266] kmem_cache_alloc_node+0x5e9/0xb10 [ 409.631709][ T6266] kmalloc_reserve+0x13d/0x4a0 [ 409.636673][ T6266] __alloc_skb+0x318/0x740 [ 409.641273][ T6266] alloc_skb_with_frags+0xc8/0xbd0 [ 409.646626][ T6266] sock_alloc_send_pskb+0xa80/0xbf0 [ 409.652092][ T6266] packet_sendmsg+0x70e8/0x9f30 [ 409.657121][ T6266] __sys_sendto+0x735/0xa10 [ 409.661896][ T6266] __ia32_sys_sendto+0x11f/0x1c0 [ 409.667025][ T6266] __do_fast_syscall_32+0xb3/0x110 [ 409.672415][ T6266] do_fast_syscall_32+0x37/0x70 [ 409.677461][ T6266] do_SYSENTER_32+0x1f/0x30 [ 409.682234][ T6266] entry_SYSENTER_compat_after_hwframe+0x70/0x7a [ 409.688814][ T6266] [ 409.691267][ T6266] CPU: 0 PID: 6266 Comm: syz-executor.0 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0 [ 409.701612][ T6266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 409.711900][ T6266] ===================================================== [ 409.718940][ T6266] Disabling lock debugging due to kernel taint [ 409.725328][ T6266] Kernel panic - not syncing: kmsan.panic set ... [ 409.731850][ T6266] CPU: 0 PID: 6266 Comm: syz-executor.0 Tainted: G B 6.7.0-syzkaller-00562-g9f8413c4a66f #0 [ 409.743465][ T6266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 409.753652][ T6266] Call Trace: [ 409.757022][ T6266] [ 409.760036][ T6266] dump_stack_lvl+0x1bf/0x240 [ 409.764903][ T6266] dump_stack+0x1e/0x20 [ 409.769222][ T6266] panic+0x4de/0xc90 [ 409.773288][ T6266] ? add_taint+0x108/0x1a0 [ 409.777899][ T6266] kmsan_report+0x2d0/0x2d0 [ 409.782586][ T6266] ? kmsan_metadata_is_contiguous+0x66/0x1e0 [ 409.788748][ T6266] ? __msan_warning+0x96/0x110 [ 409.793682][ T6266] ? hsr_get_node+0xa2e/0xa40 [ 409.798520][ T6266] ? hsr_forward_skb+0xe12/0x30e0 [ 409.803715][ T6266] ? hsr_dev_xmit+0x1a1/0x270 [ 409.808559][ T6266] ? dev_hard_start_xmit+0x247/0xa10 [ 409.813995][ T6266] ? __dev_queue_xmit+0x33b8/0x5130 [ 409.819346][ T6266] ? packet_xmit+0x9c/0x6b0 [ 409.824011][ T6266] ? packet_sendmsg+0x8b1d/0x9f30 [ 409.829200][ T6266] ? __sys_sendto+0x735/0xa10 [ 409.834051][ T6266] ? __ia32_sys_sendto+0x11f/0x1c0 [ 409.839337][ T6266] ? __do_fast_syscall_32+0xb3/0x110 [ 409.844796][ T6266] ? do_fast_syscall_32+0x37/0x70 [ 409.849995][ T6266] ? do_SYSENTER_32+0x1f/0x30 [ 409.854835][ T6266] ? entry_SYSENTER_compat_after_hwframe+0x70/0x7a [ 409.861540][ T6266] ? kmsan_internal_poison_memory+0x82/0xa0 [ 409.867617][ T6266] ? kmsan_internal_poison_memory+0x49/0xa0 [ 409.873687][ T6266] ? kmsan_slab_alloc+0xdd/0x150 [ 409.878818][ T6266] ? slab_post_alloc_hook+0x129/0xa70 [ 409.884371][ T6266] ? kmem_cache_alloc_node+0x5e9/0xb10 [ 409.890003][ T6266] ? kmalloc_reserve+0x13d/0x4a0 [ 409.895124][ T6266] ? __alloc_skb+0x318/0x740 [ 409.899890][ T6266] ? alloc_skb_with_frags+0xc8/0xbd0 [ 409.905332][ T6266] ? sock_alloc_send_pskb+0xa80/0xbf0 [ 409.910865][ T6266] ? packet_sendmsg+0x70e8/0x9f30 [ 409.916054][ T6266] ? __sys_sendto+0x735/0xa10 [ 409.920904][ T6266] ? __ia32_sys_sendto+0x11f/0x1c0 [ 409.926195][ T6266] ? __do_fast_syscall_32+0xb3/0x110 [ 409.931656][ T6266] ? do_fast_syscall_32+0x37/0x70 [ 409.936866][ T6266] ? do_SYSENTER_32+0x1f/0x30 [ 409.941742][ T6266] ? entry_SYSENTER_compat_after_hwframe+0x70/0x7a [ 409.948478][ T6266] ? filter_irq_stacks+0x60/0x1a0 [ 409.953717][ T6266] ? hsr_forward_skb+0x43/0x30e0 [ 409.958850][ T6266] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 409.964860][ T6266] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 409.970888][ T6266] __msan_warning+0x96/0x110 [ 409.975677][ T6266] hsr_get_node+0xa2e/0xa40 [ 409.980395][ T6266] hsr_forward_skb+0xe12/0x30e0 [ 409.985465][ T6266] ? kmsan_internal_unpoison_memory+0x14/0x20 [ 409.991756][ T6266] hsr_dev_xmit+0x1a1/0x270 [ 409.996446][ T6266] ? is_hsr_master+0x90/0x90 [ 410.001203][ T6266] dev_hard_start_xmit+0x247/0xa10 [ 410.006495][ T6266] __dev_queue_xmit+0x33b8/0x5130 [ 410.011673][ T6266] ? __dev_queue_xmit+0x34b/0x5130 [ 410.016978][ T6266] packet_xmit+0x9c/0x6b0 [ 410.021487][ T6266] packet_sendmsg+0x8b1d/0x9f30 [ 410.026506][ T6266] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 410.032515][ T6266] ? aa_label_sk_perm+0x644/0x780 [ 410.037738][ T6266] ? filter_irq_stacks+0x60/0x1a0 [ 410.042950][ T6266] ? kmsan_internal_set_shadow_origin+0x66/0xe0 [ 410.049482][ T6266] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 410.055520][ T6266] ? packet_getsockopt+0xfb0/0xfb0 [ 410.060800][ T6266] __sys_sendto+0x735/0xa10 [ 410.065482][ T6266] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 410.071509][ T6266] __ia32_sys_sendto+0x11f/0x1c0 [ 410.076641][ T6266] __do_fast_syscall_32+0xb3/0x110 [ 410.081948][ T6266] ? switch_fpu_return+0x17/0x20 [ 410.087063][ T6266] do_fast_syscall_32+0x37/0x70 [ 410.092087][ T6266] do_SYSENTER_32+0x1f/0x30 [ 410.096758][ T6266] entry_SYSENTER_compat_after_hwframe+0x70/0x7a [ 410.103288][ T6266] RIP: 0023:0xf7f8a579 [ 410.107462][ T6266] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 [ 410.127238][ T6266] RSP: 002b:00000000f7f855ac EFLAGS: 00000292 ORIG_RAX: 0000000000000171 [ 410.135797][ T6266] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200009c0 [ 410.143890][ T6266] RDX: 000000000000000e RSI: 0000000000000000 RDI: 0000000020000a80 [ 410.151972][ T6266] RBP: 0000000000000014 R08: 0000000000000000 R09: 0000000000000000 [ 410.160053][ T6266] R10: 0000000000000000 R11: 0000000000000292 R12: 0000000000000000 [ 410.168144][ T6266] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 410.176244][ T6266] [ 410.179554][ T6266] Kernel Offset: disabled [ 410.183922][ T6266] Rebooting in 86400 seconds..