[ OK ] Found device /dev/ttyS0. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started System Logging Service. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 119.439541][ T8160] sshd (8160) used greatest stack depth: 4640 bytes left Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. 2020/09/11 18:20:28 fuzzer started 2020/09/11 18:20:28 dialing manager at 10.128.0.26:36949 2020/09/11 18:20:29 syscalls: 3168 2020/09/11 18:20:29 code coverage: enabled 2020/09/11 18:20:29 comparison tracing: enabled 2020/09/11 18:20:29 extra coverage: enabled 2020/09/11 18:20:29 setuid sandbox: enabled 2020/09/11 18:20:29 namespace sandbox: enabled 2020/09/11 18:20:29 Android sandbox: /sys/fs/selinux/policy does not exist 2020/09/11 18:20:29 fault injection: enabled 2020/09/11 18:20:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/11 18:20:29 net packet injection: enabled 2020/09/11 18:20:29 net device setup: enabled 2020/09/11 18:20:29 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/11 18:20:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/11 18:20:29 USB emulation: enabled 2020/09/11 18:20:29 hci packet injection: enabled 18:25:17 executing program 0: r0 = socket(0x10, 0x3, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x70, 0x12, 0xf0b, 0x0, 0x0, {}, [@TCA_EGRESS_BLOCK={0x8}, @TCA_STAB={0x44, 0x8, 0x0, 0x1, [{{0x1c}, {0x24}}, {{0x1c, 0x1, {0x9}}, {0x4}}]}]}, 0x70}}, 0x0) [ 435.838740][ T8494] IPVS: ftp: loaded support on port[0] = 21 [ 436.150559][ T8494] chnl_net:caif_netlink_parms(): no params data found [ 436.302887][ T8494] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.310348][ T8494] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.319985][ T8494] device bridge_slave_0 entered promiscuous mode [ 436.335683][ T8494] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.343724][ T8494] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.353299][ T8494] device bridge_slave_1 entered promiscuous mode [ 436.410913][ T8494] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 436.429591][ T8494] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 436.485186][ T8494] team0: Port device team_slave_0 added [ 436.498499][ T8494] team0: Port device team_slave_1 added [ 436.548849][ T8494] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 436.556139][ T8494] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 436.582416][ T8494] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 436.599191][ T8494] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 436.606263][ T8494] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 436.633431][ T8494] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 436.694989][ T8494] device hsr_slave_0 entered promiscuous mode [ 436.706183][ T8494] device hsr_slave_1 entered promiscuous mode [ 436.977610][ T8494] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 436.995966][ T8494] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 437.017772][ T8494] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 437.038894][ T8494] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 437.337355][ T8494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.372839][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 437.381933][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.406640][ T8494] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.430842][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 437.442205][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.451838][ T3769] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.459302][ T3769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.522994][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 437.532833][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.542794][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.552324][ T3769] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.559858][ T3769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.568993][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 437.579949][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 437.590882][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 437.601735][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 437.634206][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 437.644449][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 437.655235][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.673876][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.684245][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.699651][ T3769] Bluetooth: hci0: command 0x0409 tx timeout [ 437.714485][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 437.724360][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.757392][ T8494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 437.816537][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 437.825053][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 437.860472][ T8494] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 437.920279][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 437.930948][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 437.995136][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 438.005208][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.034235][ T8494] device veth0_vlan entered promiscuous mode [ 438.042709][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 438.051903][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 438.089804][ T8494] device veth1_vlan entered promiscuous mode [ 438.120528][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 438.130859][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 438.190259][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 438.200117][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 438.221365][ T8494] device veth0_macvtap entered promiscuous mode [ 438.244626][ T8494] device veth1_macvtap entered promiscuous mode [ 438.296465][ T8494] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 438.304411][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 438.314765][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 438.324322][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 438.334403][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 438.359592][ T8494] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 438.406500][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 438.416843][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:25:21 executing program 0: unshare(0x6c060000) r0 = socket$inet6(0x10, 0x3, 0x87) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b276062f763e9b200a00080001c0", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4069, 0xfe5, 0x0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[], 0x1}}, 0x0) socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0x71, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r1, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1}, 0x100) [ 438.858104][ T8716] IPVS: ftp: loaded support on port[0] = 21 [ 439.151549][ T8574] tipc: TX() has been purged, node left! 18:25:22 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) 18:25:22 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) [ 439.761477][ T8709] Bluetooth: hci0: command 0x041b tx timeout 18:25:23 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) 18:25:23 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) 18:25:23 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) 18:25:23 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200), 0x800) 18:25:24 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) 18:25:24 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:24 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:24 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:25 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) [ 441.839094][ T8708] Bluetooth: hci0: command 0x040f tx timeout 18:25:25 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:25 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:25 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:25 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:25 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:26 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:26 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:26 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:26 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:27 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) [ 443.910080][ T8708] Bluetooth: hci0: command 0x0419 tx timeout 18:25:27 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:27 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:27 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:27 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 18:25:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 18:25:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 18:25:29 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:29 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) 18:25:29 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) 18:25:29 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) 18:25:29 executing program 0: r0 = socket(0x10, 0x3, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)=ANY=[@ANYBLOB="c800000012000b0f2abd70000000000000000000", @ANYRES32, @ANYBLOB="0000000000000f000000000008000e00000000009c0008801c0001003f12f9ff030000000000000007000000ff0300000800000014000200fde957112ac7cb306f002000010001001c000100040061b209b100000100000006000000090000000100000006000200050000001c000100090102007f000000020000000300000009000000010000000600020094e000001c00010006"], 0xc8}}, 0x0) 18:25:29 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, 0x0) mmap$dsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x12, r0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0x800c5011, &(0x7f00000000c0)) 18:25:30 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000080)={0x12, 0x9e, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r0, &(0x7f00000004c0), 0x0}, 0x20) 18:25:30 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) 18:25:30 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) 18:25:30 executing program 1 (fault-call:1 fault-nth:0): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:30 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000240)={0x0, r2, 0x1}) 18:25:31 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) pipe2(&(0x7f0000000200), 0x800) 18:25:31 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x14000, 0x0) 18:25:31 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', &(0x7f0000002780)=ANY=[@ANYBLOB='gre\b\x00p0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="070000100000ed2b000000054310008c0064000045049078ac1414bbac1414358917c57f000001e0000001ac1414bb7f000001ffffffff070f2c7f0000017f0000010a01010001444c2aa30a01010000010001e0000001000000206401010000000005ac1414aa000001016401010000000432ffffffff000000020000000000000100ffffffff0000ffffac141410000002000100000000"]}) 18:25:31 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000000c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:31 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:32 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:32 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 449.294697][ T8890] IPVS: ftp: loaded support on port[0] = 21 18:25:32 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:33 executing program 0: eventfd2(0x1, 0x800) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 449.987494][ T8890] chnl_net:caif_netlink_parms(): no params data found 18:25:33 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 450.372960][ T8890] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.380377][ T8890] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.389899][ T8890] device bridge_slave_0 entered promiscuous mode [ 450.422681][ T8890] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.430166][ T8890] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.439690][ T8890] device bridge_slave_1 entered promiscuous mode [ 450.493315][ T8890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 450.529683][ T8890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 450.602884][ T8890] team0: Port device team_slave_0 added [ 450.619975][ T8890] team0: Port device team_slave_1 added [ 450.707555][ T8890] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 450.715399][ T8890] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 450.742394][ T8890] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 450.814789][ T8890] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 450.822002][ T8890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 450.848194][ T8890] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 451.047122][ T8890] device hsr_slave_0 entered promiscuous mode [ 451.057481][ T8890] device hsr_slave_1 entered promiscuous mode [ 451.066283][ T8890] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 451.074137][ T8890] Cannot create hsr debugfs directory [ 451.193259][ T3218] Bluetooth: hci1: command 0x0409 tx timeout [ 451.528608][ T8890] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 451.576436][ T8890] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 451.604388][ T8890] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 451.642399][ T8890] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 451.942669][ T8890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 451.977688][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 451.987338][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 452.008299][ T8890] 8021q: adding VLAN 0 to HW filter on device team0 [ 452.032758][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 452.043545][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 452.053039][ T3218] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.060448][ T3218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.108648][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 452.117916][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 452.128080][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 452.137540][ T3218] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.144934][ T3218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.154018][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 452.164907][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 452.186066][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 452.195490][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 452.255859][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 452.264940][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 452.275624][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 452.285351][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 452.295191][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 452.304915][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 452.314615][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 452.336315][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 452.405863][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 452.413984][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 452.444483][ T8890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 452.506115][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 452.516264][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 452.576082][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.586021][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.610081][ T8890] device veth0_vlan entered promiscuous mode [ 452.630996][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.640167][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.658987][ T8890] device veth1_vlan entered promiscuous mode [ 452.741331][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 452.751188][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 452.760818][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 452.770872][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.794352][ T8890] device veth0_macvtap entered promiscuous mode [ 452.815063][ T8890] device veth1_macvtap entered promiscuous mode [ 452.845466][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 452.856110][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.892400][ T8890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 452.903261][ T8890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 452.918543][ T8890] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 452.926601][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.936744][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.984155][ T8890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 452.995166][ T8890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 453.008804][ T8890] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 453.024920][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 453.035800][ T8712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 453.273698][ T3218] Bluetooth: hci1: command 0x041b tx timeout [ 453.534421][ T9118] FAULT_INJECTION: forcing a failure. [ 453.534421][ T9118] name failslab, interval 1, probability 0, space 0, times 1 [ 453.547271][ T9118] CPU: 0 PID: 9118 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 453.555925][ T9118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.566048][ T9118] Call Trace: [ 453.569527][ T9118] dump_stack+0x21c/0x280 [ 453.574018][ T9118] should_fail+0x8b7/0x9e0 [ 453.578596][ T9118] __should_failslab+0x1f6/0x290 [ 453.583685][ T9118] should_failslab+0x29/0x70 [ 453.588414][ T9118] __kmalloc+0xae/0x410 [ 453.592669][ T9118] ? kmsan_get_metadata+0x116/0x180 [ 453.598015][ T9118] ? tomoyo_realpath_from_path+0x15a/0xcb0 [ 453.603927][ T9118] tomoyo_realpath_from_path+0x15a/0xcb0 [ 453.609681][ T9118] tomoyo_path_number_perm+0x2a4/0xaf0 [ 453.615251][ T9118] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 453.621183][ T9118] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 453.627352][ T9118] tomoyo_file_ioctl+0x74/0x90 [ 453.632216][ T9118] ? tomoyo_inode_getattr+0x60/0x60 [ 453.637562][ T9118] security_file_ioctl+0x10a/0x210 [ 453.642815][ T9118] __se_sys_ioctl+0x143/0x4d0 [ 453.647595][ T9118] __x64_sys_ioctl+0x4a/0x70 [ 453.652344][ T9118] do_syscall_64+0xad/0x160 [ 453.656994][ T9118] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 453.662953][ T9118] RIP: 0033:0x45d5b9 [ 453.666906][ T9118] Code: Bad RIP value. [ 453.671041][ T9118] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.679539][ T9118] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 453.687585][ T9118] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 453.695632][ T9118] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 453.703677][ T9118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 453.711765][ T9118] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c [ 453.720685][ T9118] ERROR: Out of memory at tomoyo_realpath_from_path. 18:25:37 executing program 1 (fault-call:1 fault-nth:1): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:37 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 454.093131][ T9126] FAULT_INJECTION: forcing a failure. [ 454.093131][ T9126] name failslab, interval 1, probability 0, space 0, times 0 [ 454.106261][ T9126] CPU: 0 PID: 9126 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 454.114929][ T9126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.125050][ T9126] Call Trace: [ 454.128452][ T9126] dump_stack+0x21c/0x280 [ 454.132895][ T9126] should_fail+0x8b7/0x9e0 [ 454.137440][ T9126] __should_failslab+0x1f6/0x290 [ 454.142496][ T9126] should_failslab+0x29/0x70 [ 454.147197][ T9126] __kmalloc+0xae/0x410 [ 454.151456][ T9126] ? kmsan_get_metadata+0x116/0x180 [ 454.156747][ T9126] ? tomoyo_encode2+0x5b1/0xab0 [ 454.161701][ T9126] tomoyo_encode2+0x5b1/0xab0 [ 454.166587][ T9126] tomoyo_realpath_from_path+0xba0/0xcb0 [ 454.172337][ T9126] tomoyo_path_number_perm+0x2a4/0xaf0 [ 454.177912][ T9126] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 454.183846][ T9126] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 454.190024][ T9126] tomoyo_file_ioctl+0x74/0x90 [ 454.194893][ T9126] ? tomoyo_inode_getattr+0x60/0x60 [ 454.200192][ T9126] security_file_ioctl+0x10a/0x210 [ 454.205410][ T9126] __se_sys_ioctl+0x143/0x4d0 [ 454.210198][ T9126] __x64_sys_ioctl+0x4a/0x70 [ 454.214892][ T9126] do_syscall_64+0xad/0x160 [ 454.219498][ T9126] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 454.225460][ T9126] RIP: 0033:0x45d5b9 [ 454.229396][ T9126] Code: Bad RIP value. [ 454.233524][ T9126] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:25:37 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 454.242026][ T9126] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 454.250084][ T9126] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 454.258134][ T9126] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 454.266185][ T9126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 454.274237][ T9126] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c [ 454.283753][ T9126] ERROR: Out of memory at tomoyo_realpath_from_path. 18:25:37 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:38 executing program 1 (fault-call:1 fault-nth:2): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 454.970180][ T9140] FAULT_INJECTION: forcing a failure. [ 454.970180][ T9140] name failslab, interval 1, probability 0, space 0, times 0 [ 454.982991][ T9140] CPU: 1 PID: 9140 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 454.991674][ T9140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.001792][ T9140] Call Trace: [ 455.005204][ T9140] dump_stack+0x21c/0x280 [ 455.009825][ T9140] should_fail+0x8b7/0x9e0 [ 455.014372][ T9140] __should_failslab+0x1f6/0x290 [ 455.019440][ T9140] should_failslab+0x29/0x70 [ 455.024158][ T9140] kmem_cache_alloc_trace+0xf7/0xc70 [ 455.029554][ T9140] ? kmsan_internal_set_origin+0x75/0xb0 [ 455.035358][ T9140] ? tomoyo_init_log+0x1cf/0x3a10 [ 455.040487][ T9140] ? __msan_poison_alloca+0xf0/0x120 [ 455.045899][ T9140] tomoyo_init_log+0x1cf/0x3a10 [ 455.050861][ T9140] ? __msan_get_context_state+0x9/0x20 [ 455.056426][ T9140] ? idtentry_exit_cond_rcu+0x12/0x50 [ 455.061983][ T9140] ? tomoyo_domain_quota_is_ok+0x21b/0x950 18:25:38 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 455.067892][ T9140] ? kmsan_get_metadata+0x116/0x180 [ 455.073203][ T9140] ? kmsan_get_metadata+0x116/0x180 [ 455.078510][ T9140] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 455.084430][ T9140] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 455.090610][ T9140] ? tomoyo_domain_quota_is_ok+0x73a/0x950 [ 455.096968][ T9140] tomoyo_supervisor+0x8cd/0x2840 [ 455.102116][ T9140] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 455.107990][ T9140] tomoyo_path_number_perm+0x88e/0xaf0 [ 455.113588][ T9140] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 455.119740][ T9140] tomoyo_file_ioctl+0x74/0x90 [ 455.124579][ T9140] ? tomoyo_inode_getattr+0x60/0x60 [ 455.129839][ T9140] security_file_ioctl+0x10a/0x210 [ 455.135031][ T9140] __se_sys_ioctl+0x143/0x4d0 [ 455.139776][ T9140] __x64_sys_ioctl+0x4a/0x70 [ 455.144436][ T9140] do_syscall_64+0xad/0x160 [ 455.149010][ T9140] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 455.154958][ T9140] RIP: 0033:0x45d5b9 [ 455.158873][ T9140] Code: Bad RIP value. [ 455.162973][ T9140] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 455.171444][ T9140] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 455.179462][ T9140] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 455.187483][ T9140] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 455.195506][ T9140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 455.203533][ T9140] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c [ 455.351177][ T3218] Bluetooth: hci1: command 0x040f tx timeout 18:25:38 executing program 1 (fault-call:1 fault-nth:3): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:38 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 455.863272][ T9148] FAULT_INJECTION: forcing a failure. [ 455.863272][ T9148] name failslab, interval 1, probability 0, space 0, times 0 [ 455.876242][ T9148] CPU: 0 PID: 9148 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 455.884910][ T9148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.895032][ T9148] Call Trace: [ 455.898444][ T9148] dump_stack+0x21c/0x280 [ 455.902902][ T9148] should_fail+0x8b7/0x9e0 [ 455.907450][ T9148] __should_failslab+0x1f6/0x290 [ 455.912508][ T9148] should_failslab+0x29/0x70 [ 455.917216][ T9148] __kmalloc+0xae/0x410 [ 455.921483][ T9148] ? kmsan_get_metadata+0x116/0x180 [ 455.926784][ T9148] ? kzalloc+0x51/0xd0 [ 455.930964][ T9148] kzalloc+0x51/0xd0 [ 455.934975][ T9148] ? tomoyo_init_log+0x322c/0x3a10 [ 455.940199][ T9148] tomoyo_init_log+0x326d/0x3a10 [ 455.945338][ T9148] tomoyo_supervisor+0x8cd/0x2840 [ 455.950725][ T9148] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 455.956637][ T9148] tomoyo_path_number_perm+0x88e/0xaf0 [ 455.962256][ T9148] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 455.968434][ T9148] tomoyo_file_ioctl+0x74/0x90 [ 455.973309][ T9148] ? tomoyo_inode_getattr+0x60/0x60 [ 455.978608][ T9148] security_file_ioctl+0x10a/0x210 [ 455.983829][ T9148] __se_sys_ioctl+0x143/0x4d0 [ 455.988620][ T9148] __x64_sys_ioctl+0x4a/0x70 [ 455.993331][ T9148] do_syscall_64+0xad/0x160 [ 455.997944][ T9148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 456.003934][ T9148] RIP: 0033:0x45d5b9 [ 456.007875][ T9148] Code: Bad RIP value. [ 456.012004][ T9148] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 456.020517][ T9148] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 456.028566][ T9148] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 456.036618][ T9148] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 456.044666][ T9148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 456.052912][ T9148] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c 18:25:39 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:39 executing program 1 (fault-call:1 fault-nth:4): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 456.426643][ T9156] FAULT_INJECTION: forcing a failure. [ 456.426643][ T9156] name failslab, interval 1, probability 0, space 0, times 0 [ 456.439502][ T9156] CPU: 0 PID: 9156 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 456.448239][ T9156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.458352][ T9156] Call Trace: [ 456.461749][ T9156] dump_stack+0x21c/0x280 [ 456.466196][ T9156] should_fail+0x8b7/0x9e0 [ 456.470730][ T9156] __should_failslab+0x1f6/0x290 [ 456.475809][ T9156] should_failslab+0x29/0x70 [ 456.480503][ T9156] __kmalloc+0xae/0x410 [ 456.484773][ T9156] ? tomoyo_supervisor+0x201a/0x2840 [ 456.490182][ T9156] tomoyo_supervisor+0x201a/0x2840 [ 456.495455][ T9156] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 456.501362][ T9156] tomoyo_path_number_perm+0x88e/0xaf0 [ 456.507055][ T9156] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 456.513243][ T9156] tomoyo_file_ioctl+0x74/0x90 [ 456.518113][ T9156] ? tomoyo_inode_getattr+0x60/0x60 [ 456.523406][ T9156] security_file_ioctl+0x10a/0x210 [ 456.528619][ T9156] __se_sys_ioctl+0x143/0x4d0 [ 456.533400][ T9156] __x64_sys_ioctl+0x4a/0x70 [ 456.538092][ T9156] do_syscall_64+0xad/0x160 [ 456.542699][ T9156] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 456.548657][ T9156] RIP: 0033:0x45d5b9 [ 456.552592][ T9156] Code: Bad RIP value. [ 456.556720][ T9156] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 456.565338][ T9156] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 18:25:39 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 456.573383][ T9156] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 456.581430][ T9156] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 456.589472][ T9156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 456.597535][ T9156] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c 18:25:40 executing program 1 (fault-call:1 fault-nth:5): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:40 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 457.056906][ T9164] FAULT_INJECTION: forcing a failure. [ 457.056906][ T9164] name failslab, interval 1, probability 0, space 0, times 0 [ 457.070047][ T9164] CPU: 1 PID: 9164 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 457.078709][ T9164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.088824][ T9164] Call Trace: [ 457.092239][ T9164] dump_stack+0x21c/0x280 [ 457.096689][ T9164] should_fail+0x8b7/0x9e0 [ 457.101231][ T9164] __should_failslab+0x1f6/0x290 [ 457.106305][ T9164] should_failslab+0x29/0x70 [ 457.111017][ T9164] __kmalloc+0xae/0x410 [ 457.115269][ T9164] ? kzalloc+0x51/0xd0 [ 457.119874][ T9164] kzalloc+0x51/0xd0 [ 457.123872][ T9164] tomoyo_get_name+0x4db/0xc60 [ 457.128766][ T9164] tomoyo_parse_name_union+0x2d4/0x4b0 [ 457.134336][ T9164] tomoyo_write_file+0x1268/0x2600 [ 457.139574][ T9164] ? kmsan_get_metadata+0x116/0x180 [ 457.144888][ T9164] tomoyo_supervisor+0x2718/0x2840 [ 457.150157][ T9164] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 18:25:40 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 457.156059][ T9164] tomoyo_path_number_perm+0x88e/0xaf0 [ 457.161660][ T9164] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 457.167829][ T9164] tomoyo_file_ioctl+0x74/0x90 [ 457.172702][ T9164] ? tomoyo_inode_getattr+0x60/0x60 [ 457.177996][ T9164] security_file_ioctl+0x10a/0x210 [ 457.183199][ T9164] __se_sys_ioctl+0x143/0x4d0 [ 457.187952][ T9164] __x64_sys_ioctl+0x4a/0x70 [ 457.192640][ T9164] do_syscall_64+0xad/0x160 [ 457.197211][ T9164] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 457.203146][ T9164] RIP: 0033:0x45d5b9 [ 457.207061][ T9164] Code: Bad RIP value. [ 457.211171][ T9164] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 457.219640][ T9164] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 457.227657][ T9164] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 457.235673][ T9164] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 457.243704][ T9164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 457.251733][ T9164] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c [ 457.261417][ T9164] ERROR: Out of memory at tomoyo_memory_ok. 18:25:40 executing program 1 (fault-call:1 fault-nth:6): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 457.434643][ T3218] Bluetooth: hci1: command 0x0419 tx timeout [ 457.578420][ T9169] FAULT_INJECTION: forcing a failure. [ 457.578420][ T9169] name failslab, interval 1, probability 0, space 0, times 0 [ 457.592294][ T9169] CPU: 0 PID: 9169 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 457.600984][ T9169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.611100][ T9169] Call Trace: [ 457.614514][ T9169] dump_stack+0x21c/0x280 [ 457.618960][ T9169] should_fail+0x8b7/0x9e0 [ 457.623500][ T9169] __should_failslab+0x1f6/0x290 [ 457.628557][ T9169] should_failslab+0x29/0x70 [ 457.633248][ T9169] __kmalloc+0xae/0x410 [ 457.637499][ T9169] ? kmsan_get_metadata+0x116/0x180 [ 457.642799][ T9169] ? kzalloc+0x51/0xd0 [ 457.646963][ T9169] kzalloc+0x51/0xd0 [ 457.650946][ T9169] ? tomoyo_commit_ok+0x43/0x500 [ 457.655977][ T9169] tomoyo_commit_ok+0x6b/0x500 [ 457.660852][ T9169] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 457.667015][ T9169] ? tomoyo_same_path_number_acl+0xa2/0x540 [ 457.673020][ T9169] ? kmsan_get_metadata+0x116/0x180 [ 457.678321][ T9169] tomoyo_update_domain+0x994/0xd80 [ 457.683630][ T9169] ? tomoyo_same_path_number_acl+0x540/0x540 [ 457.689710][ T9169] ? tomoyo_merge_path2_acl+0x1c0/0x1c0 [ 457.695374][ T9169] tomoyo_write_file+0x1338/0x2600 [ 457.700612][ T9169] ? kmsan_get_metadata+0x116/0x180 [ 457.705928][ T9169] tomoyo_supervisor+0x2718/0x2840 [ 457.711208][ T9169] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 457.717131][ T9169] tomoyo_path_number_perm+0x88e/0xaf0 [ 457.722741][ T9169] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 457.728951][ T9169] tomoyo_file_ioctl+0x74/0x90 [ 457.733835][ T9169] ? tomoyo_inode_getattr+0x60/0x60 [ 457.739130][ T9169] security_file_ioctl+0x10a/0x210 [ 457.744347][ T9169] __se_sys_ioctl+0x143/0x4d0 [ 457.749130][ T9169] __x64_sys_ioctl+0x4a/0x70 [ 457.753837][ T9169] do_syscall_64+0xad/0x160 [ 457.758443][ T9169] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 457.764405][ T9169] RIP: 0033:0x45d5b9 [ 457.768345][ T9169] Code: Bad RIP value. 18:25:40 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 457.772474][ T9169] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 457.780984][ T9169] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 457.789033][ T9169] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 457.797091][ T9169] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 457.805140][ T9169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 457.813212][ T9169] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c [ 457.821519][ T9169] ERROR: Out of memory at tomoyo_memory_ok. 18:25:41 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:41 executing program 1 (fault-call:1 fault-nth:7): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:41 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 458.435337][ T9177] FAULT_INJECTION: forcing a failure. [ 458.435337][ T9177] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 458.448596][ T9177] CPU: 0 PID: 9177 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 458.457258][ T9177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.467378][ T9177] Call Trace: [ 458.470784][ T9177] dump_stack+0x21c/0x280 [ 458.475225][ T9177] should_fail+0x8b7/0x9e0 [ 458.479775][ T9177] should_fail_usercopy+0x39/0x40 [ 458.484953][ T9177] _copy_from_user+0x62/0x330 [ 458.489732][ T9177] ? __msan_poison_alloca+0xf0/0x120 [ 458.495166][ T9177] ? sock_ioctl+0x2c6/0x1110 [ 458.499851][ T9177] sock_ioctl+0x309/0x1110 [ 458.504376][ T9177] ? kmsan_get_metadata+0x116/0x180 [ 458.509671][ T9177] ? sock_poll+0x500/0x500 [ 458.514179][ T9177] __se_sys_ioctl+0x319/0x4d0 [ 458.518956][ T9177] __x64_sys_ioctl+0x4a/0x70 [ 458.523656][ T9177] do_syscall_64+0xad/0x160 [ 458.528258][ T9177] entry_SYSCALL_64_after_hwframe+0x44/0xa9 18:25:41 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, 0x0) [ 458.534222][ T9177] RIP: 0033:0x45d5b9 [ 458.538158][ T9177] Code: Bad RIP value. [ 458.542286][ T9177] RSP: 002b:00007f673011fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 458.550787][ T9177] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 458.558823][ T9177] RDX: 0000000020002840 RSI: 00000000000089f2 RDI: 0000000000000003 [ 458.566873][ T9177] RBP: 00007f673011fca0 R08: 0000000000000000 R09: 0000000000000000 [ 458.574922][ T9177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 458.582983][ T9177] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c 18:25:42 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, 0x0) 18:25:42 executing program 1 (fault-call:1 fault-nth:8): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:42 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, 0x0) [ 459.320264][ T9188] FAULT_INJECTION: forcing a failure. [ 459.320264][ T9188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 459.333638][ T9188] CPU: 1 PID: 9188 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 459.342294][ T9188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.352409][ T9188] Call Trace: [ 459.355803][ T9188] dump_stack+0x21c/0x280 [ 459.360239][ T9188] should_fail+0x8b7/0x9e0 [ 459.364771][ T9188] should_fail_usercopy+0x39/0x40 [ 459.369894][ T9188] _copy_to_user+0x64/0x2b0 [ 459.374490][ T9188] ? snprintf+0x23e/0x290 [ 459.378914][ T9188] ? kmsan_get_metadata+0x116/0x180 [ 459.384216][ T9188] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 459.390196][ T9188] simple_read_from_buffer+0x310/0x4c0 [ 459.395813][ T9188] proc_fail_nth_read+0x320/0x3f0 [ 459.400952][ T9188] ? proc_fault_inject_write+0x5d0/0x5d0 [ 459.406707][ T9188] vfs_read+0x577/0x14d0 [ 459.411056][ T9188] ? kmsan_set_origin_checked+0x95/0xf0 [ 459.416712][ T9188] ? __msan_poison_alloca+0xf0/0x120 [ 459.422113][ T9188] ? mutex_lock+0x38/0x80 [ 459.426543][ T9188] ? kmsan_get_metadata+0x116/0x180 [ 459.431833][ T9188] ksys_read+0x275/0x500 [ 459.436171][ T9188] __se_sys_read+0x92/0xb0 [ 459.440678][ T9188] __x64_sys_read+0x4a/0x70 [ 459.445275][ T9188] do_syscall_64+0xad/0x160 [ 459.449871][ T9188] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 459.455825][ T9188] RIP: 0033:0x416ea1 [ 459.459760][ T9188] Code: Bad RIP value. 18:25:42 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', 0x0}) [ 459.463880][ T9188] RSP: 002b:00007f673011fc80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 459.472382][ T9188] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000416ea1 [ 459.480433][ T9188] RDX: 000000000000000f RSI: 00007f673011fcb0 RDI: 0000000000000005 [ 459.488480][ T9188] RBP: ffffffffffffffff R08: 0000000000000000 R09: 0000000000000000 [ 459.496531][ T9188] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000008 [ 459.504583][ T9188] R13: 000000000169fb6f R14: 00007f67301209c0 R15: 000000000118cf4c 18:25:42 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:42 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', 0x0}) 18:25:43 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:43 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', 0x0}) 18:25:43 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x10, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:43 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:43 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x4c01, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:43 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}) 18:25:43 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:44 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}) 18:25:44 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5421, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:44 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}) 18:25:44 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5450, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:44 executing program 0 (fault-call:1 fault-nth:0): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:44 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5451, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 461.692551][ T9226] FAULT_INJECTION: forcing a failure. [ 461.692551][ T9226] name failslab, interval 1, probability 0, space 0, times 0 [ 461.705428][ T9226] CPU: 1 PID: 9226 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 461.714086][ T9226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.724215][ T9226] Call Trace: [ 461.727623][ T9226] dump_stack+0x21c/0x280 [ 461.732064][ T9226] should_fail+0x8b7/0x9e0 [ 461.736636][ T9226] __should_failslab+0x1f6/0x290 18:25:44 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 461.741776][ T9226] should_failslab+0x29/0x70 [ 461.746470][ T9226] __kmalloc+0xae/0x410 [ 461.750723][ T9226] ? kmsan_get_metadata+0x116/0x180 [ 461.756021][ T9226] ? tomoyo_realpath_from_path+0x15a/0xcb0 [ 461.762048][ T9226] tomoyo_realpath_from_path+0x15a/0xcb0 [ 461.767809][ T9226] tomoyo_path_number_perm+0x2a4/0xaf0 [ 461.773391][ T9226] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 461.779330][ T9226] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 461.785519][ T9226] tomoyo_file_ioctl+0x74/0x90 [ 461.791360][ T9226] ? tomoyo_inode_getattr+0x60/0x60 [ 461.796652][ T9226] security_file_ioctl+0x10a/0x210 [ 461.801892][ T9226] __se_sys_ioctl+0x143/0x4d0 [ 461.806661][ T9226] __x64_sys_ioctl+0x4a/0x70 [ 461.811327][ T9226] do_syscall_64+0xad/0x160 [ 461.815985][ T9226] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 461.821931][ T9226] RIP: 0033:0x45d5b9 [ 461.825846][ T9226] Code: Bad RIP value. [ 461.830229][ T9226] RSP: 002b:00007faa0ecf5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.838723][ T9226] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 461.846745][ T9226] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 461.854778][ T9226] RBP: 00007faa0ecf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 461.862795][ T9226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 461.870815][ T9226] R13: 000000000169fb6f R14: 00007faa0ecf69c0 R15: 000000000118cf4c [ 461.879584][ T9226] ERROR: Out of memory at tomoyo_realpath_from_path. 18:25:45 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5460, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:45 executing program 0 (fault-call:1 fault-nth:1): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 462.476867][ T9236] FAULT_INJECTION: forcing a failure. [ 462.476867][ T9236] name failslab, interval 1, probability 0, space 0, times 0 [ 462.489764][ T9236] CPU: 0 PID: 9236 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 462.498456][ T9236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.508699][ T9236] Call Trace: [ 462.512136][ T9236] dump_stack+0x21c/0x280 [ 462.516589][ T9236] should_fail+0x8b7/0x9e0 [ 462.522519][ T9236] __should_failslab+0x1f6/0x290 [ 462.527569][ T9236] should_failslab+0x29/0x70 [ 462.532266][ T9236] __kmalloc+0xae/0x410 [ 462.536525][ T9236] ? kmsan_get_metadata+0x116/0x180 [ 462.541826][ T9236] ? tomoyo_encode2+0x5b1/0xab0 [ 462.546778][ T9236] tomoyo_encode2+0x5b1/0xab0 [ 462.551575][ T9236] tomoyo_realpath_from_path+0xba0/0xcb0 [ 462.557428][ T9236] tomoyo_path_number_perm+0x2a4/0xaf0 [ 462.563003][ T9236] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 462.568942][ T9236] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 462.575132][ T9236] tomoyo_file_ioctl+0x74/0x90 [ 462.579999][ T9236] ? tomoyo_inode_getattr+0x60/0x60 [ 462.586357][ T9236] security_file_ioctl+0x10a/0x210 [ 462.591575][ T9236] __se_sys_ioctl+0x143/0x4d0 [ 462.596363][ T9236] __x64_sys_ioctl+0x4a/0x70 [ 462.601495][ T9236] do_syscall_64+0xad/0x160 [ 462.606107][ T9236] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 462.612105][ T9236] RIP: 0033:0x45d5b9 [ 462.616043][ T9236] Code: Bad RIP value. [ 462.620175][ T9236] RSP: 002b:00007faa0ecf5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.628768][ T9236] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 462.636818][ T9236] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 462.644864][ T9236] RBP: 00007faa0ecf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 462.653058][ T9236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.661115][ T9236] R13: 000000000169fb6f R14: 00007faa0ecf69c0 R15: 000000000118cf4c [ 462.669595][ T9236] ERROR: Out of memory at tomoyo_realpath_from_path. 18:25:45 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x6364, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:45 executing program 0 (fault-call:1 fault-nth:2): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 462.964584][ T9241] FAULT_INJECTION: forcing a failure. [ 462.964584][ T9241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 462.977969][ T9241] CPU: 0 PID: 9241 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 462.986629][ T9241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.996741][ T9241] Call Trace: [ 463.000141][ T9241] dump_stack+0x21c/0x280 [ 463.004577][ T9241] should_fail+0x8b7/0x9e0 [ 463.009113][ T9241] should_fail_usercopy+0x39/0x40 [ 463.014227][ T9241] _copy_from_user+0x62/0x330 [ 463.019002][ T9241] ? __msan_poison_alloca+0xf0/0x120 [ 463.024396][ T9241] ? sock_ioctl+0x2c6/0x1110 [ 463.029084][ T9241] sock_ioctl+0x309/0x1110 [ 463.033613][ T9241] ? kmsan_get_metadata+0x116/0x180 [ 463.038899][ T9241] ? sock_poll+0x500/0x500 [ 463.043403][ T9241] __se_sys_ioctl+0x319/0x4d0 [ 463.048351][ T9241] __x64_sys_ioctl+0x4a/0x70 [ 463.053045][ T9241] do_syscall_64+0xad/0x160 [ 463.057643][ T9241] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 463.063605][ T9241] RIP: 0033:0x45d5b9 [ 463.067543][ T9241] Code: Bad RIP value. [ 463.071758][ T9241] RSP: 002b:00007faa0ecf5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.080266][ T9241] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 463.088315][ T9241] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 463.096364][ T9241] RBP: 00007faa0ecf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 463.104498][ T9241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 18:25:46 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 463.112546][ T9241] R13: 000000000169fb6f R14: 00007faa0ecf69c0 R15: 000000000118cf4c 18:25:46 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8911, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:46 executing program 0 (fault-call:1 fault-nth:3): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 463.603550][ T9249] FAULT_INJECTION: forcing a failure. [ 463.603550][ T9249] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 463.616924][ T9249] CPU: 0 PID: 9249 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 463.625577][ T9249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.635689][ T9249] Call Trace: [ 463.639093][ T9249] dump_stack+0x21c/0x280 [ 463.643536][ T9249] should_fail+0x8b7/0x9e0 [ 463.648085][ T9249] should_fail_usercopy+0x39/0x40 [ 463.653208][ T9249] _copy_from_user+0x62/0x330 [ 463.657985][ T9249] ? __msan_poison_alloca+0xf0/0x120 [ 463.663415][ T9249] ip_tunnel_ioctl+0xda/0x340 [ 463.668202][ T9249] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 463.674368][ T9249] ? kmsan_get_metadata+0x116/0x180 [ 463.679682][ T9249] ? ip_tunnel_update+0x10e0/0x10e0 [ 463.685028][ T9249] dev_ifsioc+0xd3c/0x1420 [ 463.689570][ T9249] dev_ioctl+0xba9/0x1f40 [ 463.694010][ T9249] sock_ioctl+0xf6b/0x1110 [ 463.698720][ T9249] ? sock_poll+0x500/0x500 [ 463.703225][ T9249] __se_sys_ioctl+0x319/0x4d0 [ 463.708004][ T9249] __x64_sys_ioctl+0x4a/0x70 [ 463.712708][ T9249] do_syscall_64+0xad/0x160 [ 463.717312][ T9249] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 463.723274][ T9249] RIP: 0033:0x45d5b9 [ 463.727216][ T9249] Code: Bad RIP value. [ 463.731347][ T9249] RSP: 002b:00007faa0ecf5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.739956][ T9249] RAX: ffffffffffffffda RBX: 000000000001ec40 RCX: 000000000045d5b9 [ 463.748016][ T9249] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000003 [ 463.756856][ T9249] RBP: 00007faa0ecf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 463.764911][ T9249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 463.772969][ T9249] R13: 000000000169fb6f R14: 00007faa0ecf69c0 R15: 000000000118cf4c 18:25:47 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:47 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:47 executing program 0 (fault-call:1 fault-nth:4): socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 464.530492][ T9257] FAULT_INJECTION: forcing a failure. [ 464.530492][ T9257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 464.543982][ T9257] CPU: 0 PID: 9257 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 464.552734][ T9257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.562854][ T9257] Call Trace: [ 464.566530][ T9257] dump_stack+0x21c/0x280 [ 464.570985][ T9257] should_fail+0x8b7/0x9e0 [ 464.575532][ T9257] should_fail_usercopy+0x39/0x40 [ 464.580656][ T9257] _copy_to_user+0x64/0x2b0 [ 464.585261][ T9257] ? snprintf+0x23e/0x290 [ 464.589698][ T9257] ? kmsan_get_metadata+0x116/0x180 [ 464.595007][ T9257] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 464.600909][ T9257] simple_read_from_buffer+0x310/0x4c0 [ 464.601000][ T9257] proc_fail_nth_read+0x320/0x3f0 [ 464.601081][ T9257] ? proc_fault_inject_write+0x5d0/0x5d0 [ 464.601195][ T9257] vfs_read+0x577/0x14d0 [ 464.621593][ T9257] ? kmsan_set_origin_checked+0x95/0xf0 [ 464.627279][ T9257] ? __msan_poison_alloca+0xf0/0x120 [ 464.632857][ T9257] ? mutex_lock+0x38/0x80 [ 464.637466][ T9257] ? kmsan_get_metadata+0x116/0x180 [ 464.642764][ T9257] ksys_read+0x275/0x500 [ 464.647119][ T9257] __se_sys_read+0x92/0xb0 [ 464.651638][ T9257] __x64_sys_read+0x4a/0x70 [ 464.656248][ T9257] do_syscall_64+0xad/0x160 [ 464.660851][ T9257] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 464.666807][ T9257] RIP: 0033:0x416ea1 [ 464.671290][ T9257] Code: Bad RIP value. 18:25:47 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891d, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 464.675416][ T9257] RSP: 002b:00007faa0ecf5c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 464.683928][ T9257] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000416ea1 [ 464.691984][ T9257] RDX: 000000000000000f RSI: 00007faa0ecf5cb0 RDI: 0000000000000005 [ 464.700917][ T9257] RBP: ffffffffffffffff R08: 0000000000000000 R09: 0000000000000000 [ 464.708974][ T9257] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 464.717984][ T9257] R13: 000000000169fb6f R14: 00007faa0ecf69c0 R15: 000000000118cf4c 18:25:48 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891e, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:48 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:48 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891f, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:48 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:48 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8920, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:49 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x10, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:49 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8921, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:49 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x4c01, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:49 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xff, 0x80003) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x480000, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x3ebb, 0x88000) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f00000000c0)={0x6007, 0x7, 0x6, 0x1ff}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000100)={0x0, 0x13}) fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000180)={"3a3ef5dfbd26aceec4fb2ead7b582c64", 0x0, 0x0, {0x80000001, 0x3ff}, {0x4, 0x80000000}, 0x4, [0xad16468, 0x4, 0x1, 0xd207, 0x9, 0x200, 0x9, 0x6, 0x1, 0x100000001, 0x2, 0x7, 0x2f, 0xfffffffffffffffc, 0xd19c, 0xffff0000000]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000280)={{r3}, r4, 0x12, @unused=[0x2, 0xdd, 0x6540, 0x31e], @name="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"}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001340)={&(0x7f00000012c0)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xdf12}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/nvram\x00', 0x84000, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000001400)={0x3, 0x7, {0xffffffffffffffff}, {0xee00}, 0x1, 0x5}) write$P9_RGETATTR(r6, &(0x7f0000001440)={0xa0, 0x19, 0x1, {0x1, {0x0, 0x200, 0x8}, 0xc0, r7, 0x0, 0x46, 0x20, 0x0, 0x4, 0xfffffffffffffff8, 0x200, 0x4, 0x10000, 0x65, 0x9c, 0x80000000, 0xff, 0x1, 0x4, 0x3}}, 0xa0) ioctl$FBIOGETCMAP(r2, 0x4604, &(0x7f0000001600)={0x1ff, 0x2, &(0x7f0000001500)=[0x0, 0x0], &(0x7f0000001540)=[0x0, 0x0, 0x0], &(0x7f0000001580)=[0x0], &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x50, r0, 0x8000000) getsockopt$inet_sctp_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000001640), &(0x7f0000001680)=0x4) ioctl$USBDEVFS_CONTROL(r6, 0xc0185500, &(0x7f0000001740)={0x4, 0xc, 0x7, 0x2, 0x61, 0x3, &(0x7f00000016c0)="49d7bb93b1cc8881fcaf1c9050a3015026742809bf011c59bf9a7b62f1353b1a20886d85d33062a74b706964b8406a0e0b4993b6af1390bcba5ee0bc21adfb99b9c1ffd0bf43624852ba24d76b8c799cb4076d2447c09c225bf8f9706a58e5cf8b"}) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, &(0x7f0000001780)) 18:25:49 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:49 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 466.554039][ T9286] erspan0: mtu less than device minimum 18:25:49 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5421, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:49 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:50 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5450, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:50 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8924, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:50 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5451, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:50 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8927, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:50 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:51 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8929, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:51 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5460, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 468.425748][ T9318] IPVS: ftp: loaded support on port[0] = 21 [ 468.925219][ T9318] chnl_net:caif_netlink_parms(): no params data found [ 469.095261][ T9318] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.103501][ T9318] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.113404][ T9318] device bridge_slave_0 entered promiscuous mode [ 469.129587][ T9318] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.137033][ T9318] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.146705][ T9318] device bridge_slave_1 entered promiscuous mode [ 469.197967][ T9318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 469.215855][ T9318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 469.277837][ T9318] team0: Port device team_slave_0 added [ 469.320209][ T9318] team0: Port device team_slave_1 added [ 469.440971][ T9318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 469.448051][ T9318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 469.475399][ T9318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 469.555460][ T9318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 469.562626][ T9318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 469.589591][ T9318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 469.660240][ T9318] device hsr_slave_0 entered promiscuous mode [ 469.670026][ T9318] device hsr_slave_1 entered promiscuous mode [ 469.687019][ T9318] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 469.695622][ T9318] Cannot create hsr debugfs directory [ 469.996738][ T9318] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 470.016760][ T9318] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 470.063081][ T9318] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 470.097408][ T9318] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 470.324985][ T8708] Bluetooth: hci2: command 0x0409 tx timeout [ 470.425342][ T9318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 470.464250][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 470.473816][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.498512][ T9318] 8021q: adding VLAN 0 to HW filter on device team0 [ 470.532004][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 470.542608][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 470.552124][ T3218] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.559350][ T3218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.623889][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 470.633513][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 470.643445][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 470.652951][ T3218] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.660276][ T3218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.669661][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 470.681171][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 470.692532][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 470.703149][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 470.724117][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 470.737570][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 470.748397][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 470.781516][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 470.792365][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 470.822543][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 470.832737][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 470.857213][ T9318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 470.920651][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 470.928532][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 470.965076][ T9318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 471.038478][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 471.049091][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 471.123385][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 471.133465][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 471.152635][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 471.161989][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 471.180422][ T9318] device veth0_vlan entered promiscuous mode [ 471.230231][ T9318] device veth1_vlan entered promiscuous mode [ 471.327532][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 471.337064][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 471.347028][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 471.356788][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 471.390445][ T9318] device veth0_macvtap entered promiscuous mode [ 471.416737][ T9318] device veth1_macvtap entered promiscuous mode [ 471.494951][ T9318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 471.505981][ T9318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 471.516040][ T9318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 471.526683][ T9318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 471.540343][ T9318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 471.552391][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 471.561981][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 471.571397][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 471.581884][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 471.607806][ T9318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 471.618773][ T9318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 471.630159][ T9318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 471.640769][ T9318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 471.654414][ T9318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 471.665763][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 471.676686][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:25:55 executing program 2: r0 = syz_usb_connect$hid(0x0, 0xfffffffffffffe99, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000013f, 0x1e7d, 0x30d4, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x4, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4, 0x1, 0x3, 0x1, 0x3, 0x0, {0x9, 0x21, 0x40, 0x20, 0x1, {0x22, 0x1}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x0, 0xff, 0x1f}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="002273005c3235d0b6a953c8265e13646989905c6f678d6260760466c2953eb1e9b8bc1fe7e466af128d96bb33b32493fc76ab3f01a612077125bf899ebba0473552fb6d36e634f73b0c4c4987384e0a031d28f0abd1ca95000000000000008ef1ad5a5e89b949100be5935c4babb34cfb14b9794043414db70cfcb50a4fb2ad970a807037301f226ee146c78264b82d0e20c5dd7c60b5e3e710d1ec9a8c518a645e1dcc"], 0x0}, 0x0) 18:25:55 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8930, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:55 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x6364, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 472.392550][ T8711] Bluetooth: hci2: command 0x041b tx timeout 18:25:55 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:55 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8931, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:56 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8932, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:56 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8911, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 472.931525][ T27] usb 3-1: new high-speed USB device number 2 using dummy_hcd 18:25:56 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8933, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:56 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 473.203105][ T27] usb 3-1: device descriptor read/64, error 18 18:25:56 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8937, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:25:56 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 473.592238][ T27] usb 3-1: device descriptor read/64, error 18 18:25:56 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8942, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 473.863170][ T27] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 474.143638][ T27] usb 3-1: device descriptor read/64, error 18 [ 474.471567][ T8711] Bluetooth: hci2: command 0x040f tx timeout [ 474.532795][ T27] usb 3-1: device descriptor read/64, error 18 [ 474.652189][ T27] usb usb3-port1: attempt power cycle [ 475.371666][ T27] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 475.463562][ T27] usb 3-1: Invalid ep0 maxpacket: 63 18:25:58 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891d, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:58 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 475.621382][ T27] usb 3-1: new high-speed USB device number 5 using dummy_hcd 18:25:59 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891e, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:59 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 476.103720][ T27] usb 3-1: device not accepting address 5, error -71 [ 476.120622][ T27] usb usb3-port1: unable to enumerate USB device 18:25:59 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891f, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:59 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 476.552416][ T8709] Bluetooth: hci2: command 0x0419 tx timeout 18:25:59 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8920, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:25:59 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8948, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:00 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8921, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:00 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8949, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:00 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:00 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = pkey_alloc(0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'sit0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3f}}}) pkey_mprotect(&(0x7f0000a4a000/0x2000)=nil, 0x2000, 0x0, r1) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r2, 0x8983, &(0x7f0000000080)) pkey_free(r1) listen(r0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x440, 0x8) close(r3) shutdown(r0, 0x1) 18:26:00 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x894a, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:01 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:01 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8970, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:01 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = pkey_alloc(0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'sit0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3f}}}) pkey_mprotect(&(0x7f0000a4a000/0x2000)=nil, 0x2000, 0x0, r1) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r2, 0x8983, &(0x7f0000000080)) pkey_free(r1) listen(r0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x440, 0x8) close(r3) shutdown(r0, 0x1) 18:26:01 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8924, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:01 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8971, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:01 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) 18:26:01 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8927, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:02 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8990, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:02 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8929, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:02 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) 18:26:02 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8930, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:02 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8991, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:02 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) 18:26:02 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8931, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:02 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) 18:26:02 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8992, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:03 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8932, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:03 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) 18:26:03 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8993, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:03 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8933, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:03 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:03 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:03 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8937, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:04 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8995, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:04 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:04 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8942, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:04 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:04 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:04 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:04 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:04 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:04 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a3, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:05 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:05 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b0, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:05 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:05 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:05 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8948, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:05 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b1, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:05 executing program 2: mkdir(0x0, 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:05 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8949, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:05 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x400448c9, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:06 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x894a, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:06 executing program 2: mkdir(0x0, 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:06 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x400448dd, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:06 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8970, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:06 executing program 2: mkdir(0x0, 0x1) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:06 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x400454ca, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:06 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8971, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:06 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:06 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40049409, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:07 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8990, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:07 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40186366, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:07 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:07 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8991, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:07 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:07 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8992, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:07 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:07 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x80086301, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:08 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8993, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:08 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:08 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:08 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:08 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:08 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 18:26:08 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8995, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:08 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:08 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 18:26:08 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:09 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc020660b, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:09 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 18:26:09 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:09 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10401, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc0e85667, &(0x7f00000000c0)={0x980001}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000200)={{r0}, "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"}) io_uring_enter(r0, 0x4c8b, 0x9597, 0x2, &(0x7f0000000080), 0x8) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000001200), &(0x7f0000001240)=0x4) sendmsg$RDMA_NLDEV_CMD_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="180000000114000128bd7000fedbdfe40800010001000000"], 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x12) socket$inet_mptcp(0x2, 0x1, 0x106) epoll_create1(0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'tunl0\x00', 0x0}) r7 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_VS_SO_GET_SERVICES(r7, 0x0, 0x482, &(0x7f0000001280)=""/129, &(0x7f0000001340)=0x81) 18:26:09 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:09 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:09 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:09 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x88) getsockname$unix(r1, &(0x7f0000000080), &(0x7f0000000000)=0x6e) [ 486.918919][ T9789] FAULT_INJECTION: forcing a failure. [ 486.918919][ T9789] name failslab, interval 1, probability 0, space 0, times 0 [ 486.931835][ T9789] CPU: 1 PID: 9789 Comm: syz-executor.2 Not tainted 5.8.0-rc5-syzkaller #0 [ 486.940505][ T9789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.950642][ T9789] Call Trace: [ 486.954044][ T9789] dump_stack+0x21c/0x280 [ 486.958451][ T9789] should_fail+0x8b7/0x9e0 [ 486.962952][ T9789] __should_failslab+0x1f6/0x290 [ 486.967968][ T9789] should_failslab+0x29/0x70 [ 486.972820][ T9789] __kmalloc_track_caller+0x1a8/0xe10 [ 486.978265][ T9789] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 486.984398][ T9789] ? __se_sys_mount+0xe0/0x420 [ 486.989320][ T9789] strndup_user+0x19d/0x410 [ 486.993899][ T9789] __se_sys_mount+0xe0/0x420 [ 486.998586][ T9789] ? kmsan_get_metadata+0x116/0x180 [ 487.003885][ T9789] ? kmsan_set_origin_checked+0x95/0xf0 [ 487.009519][ T9789] __x64_sys_mount+0x62/0x80 [ 487.014286][ T9789] do_syscall_64+0xad/0x160 [ 487.018898][ T9789] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 487.025366][ T9789] RIP: 0033:0x45d5b9 [ 487.029291][ T9789] Code: Bad RIP value. [ 487.033403][ T9789] RSP: 002b:00007f1b6a55ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 487.041886][ T9789] RAX: ffffffffffffffda RBX: 00000000000212c0 RCX: 000000000045d5b9 [ 487.050354][ T9789] RDX: 0000000020000280 RSI: 0000000020000400 RDI: 0000000000000000 [ 487.058379][ T9789] RBP: 00007f1b6a55eca0 R08: 0000000000000000 R09: 0000000000000000 18:26:10 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'erspan0\x00', 0x0}) [ 487.066398][ T9789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 487.074425][ T9789] R13: 000000000169fb6f R14: 00007f1b6a55f9c0 R15: 000000000118cf4c 18:26:10 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:10 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x101100, 0x3) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) getgid() arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x202a00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x3}}]}, 0x20}}, 0x40001) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000140)={0x1, 0x9, 0x1, 0x80800, r0}) r2 = dup2(r1, r0) msgget$private(0x0, 0x80) bind$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) rt_sigreturn() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000240)=[{{0x2, 0x0, 0x1}, {0x1}}, {{0x0, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x1}}, {{0x4, 0x1, 0x1, 0x1}, {0x4, 0x0, 0x1}}, {{0x1, 0x1}, {0x4, 0x0, 0x0, 0x1}}, {{0x4, 0x0, 0x1}, {0x4, 0x1, 0x1, 0x1}}, {{0x1, 0x0, 0x0, 0x1}, {0x3, 0x1, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x4}}, {{0x4, 0x1, 0x1, 0x1}, {0x2, 0x0, 0x1, 0x1}}], 0x40) r4 = accept4(r0, &(0x7f0000000280)=@caif=@dbg, &(0x7f0000000300)=0x80, 0x0) ioctl(r2, 0x0, &(0x7f0000000340)="d4de7528495e069faca4841d367792280beaec693fad8c3223939936486fdcbda08a65a171ee86448284ce1be07b12fa4bec85537d542152c4144a84d42593ea61943e896722be1a448b8f087342bbe67844a89df7bb66f99eec90c2f423de3a372adf9a982ce073104e2f72c83962c2f4f6e4a084e9f9d4d85904fe4d329b2eea6b8203a8fc0a9459a366d607347870bf3b492c02f6e03741af3dac") sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000001340)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001300)={&(0x7f0000000440)={0xea8, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0xca4, 0x8, 0x0, 0x1, [{0x938, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ALLOWEDIPS={0x3b8, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0xd}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x1a}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @broadcast}}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ALLOWEDIPS={0x380, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x2d}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x15}}, {0x5, 0x3, 0x1}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x819}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x200}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20x0, &(0x7f0000001400), {0x1b}, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/183, &(0x7f0000001540)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r3}}, 0x58) ptrace$getregs(0xc, r5, 0x0, &(0x7f0000001600)=""/148) ioctl$SNDRV_PCM_IOCTL_DROP(r0, 0x4143, 0x0) sendmsg$can_j1939(r0, &(0x7f00000021c0)={&(0x7f00000020c0)={0x1d, 0x0, 0x1, {0x0, 0xf0, 0x1}, 0xfd}, 0x18, &(0x7f0000002180)={&(0x7f0000002100)="792c851d18c04d17819f451fe47e46c71a840d64758471eaeee719706becec2b18ab25dc156956cc03c940c8d2b1531b1464f02becca40c3843aa89f0edaf2352c77f67232777cf70b97bb1d2cdd3a0c720a43f4c5c0c28f23482bb49a406002e42c9e26e4763c5e14f0", 0x6a}, 0x1, 0x0, 0x0, 0x4000810}, 0x1) 18:26:10 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:10 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000080)=""/90, &(0x7f0000000000)=0x5a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000002840)={'tunl0\x00', 0x0}) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000140)={0x1ff, 0x18, [], 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0]}) 18:26:11 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 18:26:11 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000140)={0x1000, 0x4, 0x5, "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"}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'erspan0\x00', 0x0}) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) 18:26:11 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:11 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2, 0x0) 18:26:11 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x440200) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000480)={0x0, 0x1, 0x7, 0x7, 0x1ef, &(0x7f0000000080)="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"}) socketpair(0x2a, 0x2, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:11 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x400448c9, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:11 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x3, 0x0) 18:26:12 executing program 1: socketpair(0x1f, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:12 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x400448dd, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 489.874950][ T9834] IPVS: ftp: loaded support on port[0] = 21 [ 490.371167][ T9834] chnl_net:caif_netlink_parms(): no params data found [ 490.527434][ T9834] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.535216][ T9834] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.544988][ T9834] device bridge_slave_0 entered promiscuous mode [ 490.562071][ T9834] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.569545][ T9834] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.579267][ T9834] device bridge_slave_1 entered promiscuous mode [ 490.633516][ T9834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 490.651648][ T9834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 490.705447][ T9834] team0: Port device team_slave_0 added [ 490.720655][ T9834] team0: Port device team_slave_1 added [ 490.766873][ T9834] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 490.774384][ T9834] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 490.801210][ T9834] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 490.824424][ T9834] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 490.831500][ T9834] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 490.858584][ T9834] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 490.921285][ T9834] device hsr_slave_0 entered promiscuous mode [ 490.937007][ T9834] device hsr_slave_1 entered promiscuous mode [ 490.946686][ T9834] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 490.954639][ T9834] Cannot create hsr debugfs directory [ 491.242869][ T9834] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 491.259732][ T9834] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 491.283871][ T9834] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 491.303895][ T9834] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 491.623648][ T9834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 491.659988][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 491.669154][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 491.691461][ T9834] 8021q: adding VLAN 0 to HW filter on device team0 [ 491.719624][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 491.731474][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 491.741062][ T3218] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.748444][ T3218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.762586][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 491.804271][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 491.813929][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 491.823824][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 491.833248][ T3218] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.840475][ T3218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.849596][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 491.863863][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 491.887600][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 491.897207][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 491.953130][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 491.963002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 491.973572][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 491.984927][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 491.994825][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 492.038803][ T9834] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 492.051946][ T9834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 492.080991][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 492.091014][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 492.141503][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 492.149348][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 492.175608][ T9834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 492.255656][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 492.266200][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 492.345939][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 492.355576][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.381791][ T9834] device veth0_vlan entered promiscuous mode [ 492.401649][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 492.410840][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 492.449394][ T9834] device veth1_vlan entered promiscuous mode [ 492.548020][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 492.558015][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 492.579038][ T9834] device veth0_macvtap entered promiscuous mode [ 492.617569][ T9834] device veth1_macvtap entered promiscuous mode [ 492.675264][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 492.685915][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 492.696006][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 492.707039][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 492.717153][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 492.727813][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 492.741906][ T9834] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 492.752497][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 492.762007][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 492.771522][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 492.781782][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 492.839508][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 492.850180][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 492.860321][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 492.871046][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 492.881287][ T9834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 492.892931][ T9834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 492.906942][ T9834] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 492.926176][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 492.936401][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:26:16 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:16 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000002840)={'ip_vti0\x00', 0x0}) 18:26:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x4, 0x0) 18:26:16 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x400454ca, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:17 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40049409, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x5, 0x0) [ 493.833979][ T5] Bluetooth: hci3: command 0x041b tx timeout 18:26:17 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:17 executing program 1: socketpair(0x1e, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socket$inet_dccp(0x2, 0x6, 0x0) recvmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/199, 0xc7}, {&(0x7f0000000200)=""/70, 0x46}, {&(0x7f0000000280)=""/98, 0x62}], 0x3, &(0x7f0000000300)=""/182, 0xb6}, 0x15}], 0x1, 0x2000, &(0x7f0000000400)={0x0, 0x3938700}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f000000dbc0)=@gcm_128={{0x303}, "91d9f04f8a1c45c8", "892b6ff16ead3661153cd43fcf616c39", "01a91f35", "fe0e39c904e5fcaa"}, 0x28) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$sock(r3, &(0x7f0000000680)=[{{&(0x7f0000000440)=@pppoe={0x18, 0x0, {0x0, @multicast, 'gre0\x00'}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000500)=[@timestamping={{0x14, 0x1, 0x25, 0x9673}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x78}}, {{&(0x7f0000000580)=@tipc=@name={0x1e, 0x2, 0x3, {{0x40, 0x3}, 0x4}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000600)="37869fa2d6f4", 0x6}], 0x1}}], 0x2, 0x800) openat$adsp1(0xffffffffffffff9c, &(0x7f000000dc00)='/dev/adsp1\x00', 0x40400, 0x0) 18:26:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x6, 0x0) 18:26:17 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40186366, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:17 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:17 executing program 1: socketpair(0x5, 0x2, 0x40, &(0x7f0000000040)={0xffffffffffffffff}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x72e, 0x28a000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'gre0\x00', 0x0}) 18:26:17 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r5, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfff}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x58}, 0x1, 0x0, 0x0, 0x890}, 0x41) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xf9}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x638932996e5a8b0b}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8}]}, 0x3c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x7fffffffc, 0x0) 18:26:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x7, 0x0) 18:26:17 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:18 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8004500b, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:18 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$caif(r0, &(0x7f0000000000)=@dbg={0x25, 0x1f, 0xff}, 0x18) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000080)={0x8000, "7994cae0aed64423f94fc700f2821ff7e61ed743bd1bf0ec0b3857404cfd4f77", 0x2}) 18:26:18 executing program 3: r0 = socket(0xa, 0x3, 0x3) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000100)=0x8, 0x4) r1 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x1, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000001880)=[{&(0x7f00000014c0)=@abs, 0x6e, 0x0}], 0x1, 0x0) getpeername$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) 18:26:18 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x8, 0x0) 18:26:18 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x80086301, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:18 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000001804020014000100000000006a76ae6ea0174365976bf535aa3eb9bbc8ca4b536ff88970dd3b7ac0a1372c6f1375b72b6704871a04413c044c11ddb8e6935819cfc484ee60", @ANYRES32=0x0, @ANYBLOB="004942488c23492893efde8b98bd459e7e3a445a9d1887"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x7c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x10}, {}, {0xe}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x4c, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x4930}, @TCA_FLOW_POLICE={0x40, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c}]}]}}]}, 0x7c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000040) [ 495.914137][ T8709] Bluetooth: hci3: command 0x040f tx timeout 18:26:19 executing program 3: r0 = socket(0xa, 0x3, 0x3) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000100)=0x8, 0x4) r1 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x1, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000001880)=[{&(0x7f00000014c0)=@abs, 0x6e, 0x0}], 0x1, 0x0) getpeername$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) [ 496.031553][T10108] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 496.139787][T10113] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 18:26:19 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x800c5011, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:19 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x9, 0x0) 18:26:19 executing program 1: syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x450800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0xb1cf, 0x1, 0x1, 'queue0\x00', 0xab}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000140)={0x2}) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:19 executing program 3: getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x65, 0x300, 0x0, 0xa04901) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt(r0, 0x3, 0x80, &(0x7f0000000180)=""/116, &(0x7f0000000200)=0x74) pselect6(0x40, &(0x7f0000000000)={0x3, 0x4, 0x8001, 0x0, 0x1, 0x8, 0x6, 0xfffffffffffffffc}, &(0x7f0000000040)={0xffffffffffffc4f7, 0x5, 0x7, 0xebf4, 0xffffffffffffe83d, 0x3, 0x80000000, 0xe2}, &(0x7f0000000080)={0x53f, 0x0, 0x3, 0x4b, 0x7, 0xfffffffffffffff9, 0x1, 0x5}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0xfffffffffffffff7]}, 0x8}) 18:26:19 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:19 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xa, 0x0) 18:26:19 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1ff, 0x202201) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'tunl0\x00', 0x0}) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc0e85667, &(0x7f00000000c0)={0x980001, 0x0, 0x1a, 0x42, 0x0, {0x2, 0x4022}, 0x1}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x1, 0x7, 0xffff, 0x8}) 18:26:20 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001040)=@newtfilter={0x88, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x58, 0x2, [@TCA_BASIC_ACT={0x54, 0x3, [@m_sample={0x50, 0x1, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8}, @TCA_SAMPLE_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x88}}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001100)={0x2020}, 0x2020) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) read$FUSE(r7, &(0x7f0000003140)={0x2020}, 0x2020) 18:26:20 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:20 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r1, 0x80045503, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'gretap0\x00', 0x0}) [ 497.222442][T10138] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:20 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xb, 0x0) 18:26:20 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:20 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) socketpair(0x1e, 0x2, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:21 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xc, 0x0) 18:26:21 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc020660b, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:21 executing program 1: socketpair(0x1e, 0x2, 0xfffffffe, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0e08df2501000007"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x44) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 497.994055][ T5] Bluetooth: hci3: command 0x0419 tx timeout [ 498.002611][T10138] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:21 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:21 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x260440) syz_open_dev$hidraw(&(0x7f0000000040)='/dev/hidraw#\x00', 0x1, 0x131000) open(&(0x7f0000000340)='./bus\x00', 0x200, 0x18d) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'gre0\x00', {0x2a, 0xffffffff, 0x1}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x100) r4 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r5 = geteuid() r6 = geteuid() fsetxattr$system_posix_acl(r4, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=r5, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="040000000700000008000000", @ANYRES32=0x0, @ANYBLOB="10000200000000082000000000000000bf6ba308525fb82df4d1ae00a29f40e06b000000000000000000000000000000cb967802a35d8cf51cd8a6b0caae714e399af327eca1a4e4fe36e2648cd3bcc59a1b37cd350944aa459f1d304fa8b17722736a44510363745431f26bc2e31a60a275bc6211731f0361878aa0c2930a0e00920006e9fdb4eae261d4c02c1fe9c5659f5d672bf342eacd48f6806b463b3a94083644525ad3670c2a888ee1a4fa9bd178b4e2f2b734cb2a8c260efb90130bc6afd43aeee4e5410c904bfaeebd4782454044c095cad8923b8682629a5a67f101a1a2fcd828392f1507dfecad1c2530c84da1c9dc457ed82cbc622bbe9273159cef38d5c5c3c72797d7b4f6b463bf6a0eadd053bd82a4cf6c8ba5536c23c99bd67a59f429027cdaaf18a497760080f7241c3040b51458adb47b2c786d3fe8d48315d12079bd4b28d6ecb69b0dfdc3c6c4fe56db1cd32fcdc10aac13394f9e8a71905f5dfb08b69f24225ee86859e1c48fdd8c4439c3f5f6c270d31102feb71a9767c3de68861b96b58a608d21719f1b789f0f1fba2fb4f9240779306ed9310459ffd4c371b7527c0b8b7ed9adaffd1f957a6ed65564e58cc382d03569cfd74881641dfa7d367e3688d020a8b64658a1599d203795be8979ecee265946"], 0x3c, 0x0) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) chown(&(0x7f0000000040)='./bus\x00', r6, r7) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000002c0)=@broute={'broute\x00', 0x20, 0x3, 0x48a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c40], 0x0, &(0x7f00000001c0), &(0x7f0000000c40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x9, 0x15, 0xf8, 'veth0_to_team\x00', 'xfrm0\x00', 'veth0_to_bond\x00', 'bridge_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], @multicast, [0x0, 0x0, 0x0, 0xff], 0xee, 0x166, 0x196, [@owner={{'owner\x00', 0x0, 0x18}, {{r6, 0xee00, r8, 0xee00, 0x7, 0x1}}}, @time={{'time\x00', 0x0, 0x18}, {{0x5, 0x400, 0xf91b, 0x13714, 0x80, 0x6, 0x1}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x3, 0x101, 0x0, 0x0, 0x0, "d2673f39c043c6e0c0bb543ba2c5b66c6e7cf6782d62e50d26bbca51490343096f4fa00c6c6bfe4a2ccd6a7bdd5a95c9013c7719da5f0b18d3d7ce8adebab9aa"}}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{0x5, 0x2a, 0x88e5, 'veth1_to_bond\x00', 'ipvlan0\x00', 'vlan1\x00', 'dummy0\x00', @multicast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0x2f}, [0xff], 0x9e, 0x116, 0x146, [@cgroup0={{'cgroup\x00', 0x0, 0x8}, {{0x80000001}}}], [@common=@AUDIT={'AUDIT\x00', 0x8}, @common=@ERROR={'ERROR\x00', 0x20, {"a2fd8f0b72655c21e005ae77f863a01122ac4c3801c3b67ee8d154e7143c"}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x5, 0x2b, 0x88a2, 'bond_slave_0\x00', 'team_slave_0\x00', 'team_slave_1\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @random="610c08118085", [0xff, 0x0, 0xff, 0xff, 0xff], 0xa6, 0xee, 0x11e, [@realm={{'realm\x00', 0x0, 0x10}, {{0x3, 0x7ff, 0x1}}}], [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x9, 0x6, {0x1c4d}}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}]}]}, 0x502) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x1, 0x2, 0x4, 0x0, 0x5, {0x77359400}, {0x3, 0x8, 0x8, 0x6, 0x4, 0x1, "3c8e6efd"}, 0x5f9b, 0x2, @planes=&(0x7f0000000100)={0x7, 0x7bd, @fd=r2, 0x1}, 0x0, 0x0, 0xffffffffffffffff}) r10 = fcntl$dupfd(r0, 0x0, r9) setsockopt$IP6T_SO_SET_REPLACE(r10, 0x29, 0x40, &(0x7f0000000600)=@mangle={'mangle\x00', 0x64, 0x6, 0x5a8, 0x3b8, 0x2c8, 0x2c8, 0x1f8, 0x0, 0x4d8, 0x4d8, 0x4d8, 0x4d8, 0x4d8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x62}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@rand_addr=' \x01\x00', @ipv4, [], [], 'hsr0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@remote, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x608) 18:26:21 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xd, 0x0) 18:26:21 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc0e85667, &(0x7f00000000c0)={0x980001, 0x0, 0x0, 0x0, 0x10010}) fallocate(r0, 0x0, 0x3, 0x7) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc0e85667, &(0x7f00000000c0)={0x980001}) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @bt={0x3, 0x3ff, 0x7, 0x4, 0x40000000, 0x6, 0x2, 0x4}}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = signalfd(r0, &(0x7f0000000240)={[0x10001]}, 0x8) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f0000000880)={0x2ec, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x98, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "718b7cb5a479754a8be534ddca16a26dcc08cdf9"}}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "8d2c2a8132194cc9c35da5e7beb8d495687b0e02a1f29b6bc82544a8d89dec73"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xdf}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1bd40000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffff9}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "fb3ef60d789fd29eb46c1939aac17290d4ac102da52025660400d2059aa09c6dd57876d2"}}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x104, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ID={0xef, 0x3, "981771ff8cf9fe02c83a6c9e7a9b41acd6827663ac4cd6f9279f2205bd5d73bb77ec9e9d7c899942c4dc16f2579e1f22d6373f058816068867a217af114c0ac039473dade4f3312ffbaf51cb577475548930996b8fd6e5c8e756eb00c9c23839478155536c73567dddb3a77730d4376c6c0932d7c62215dddca44c4cd16c3f376480f3c05dd56d41ff8572f92a1fe9da51666849a409288d8a5dfc22fc551a0b0f43205abcc1fbd3f85f4b9a5fbaff939c6357944eb275be81939af1a9aff7ba9073b11541c4fbb1d191273677e740baeb23db8a5cfdbb9640f81a45701754b3297c21eab7fce2dab31f98"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x6c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x68, 0x3, "fbc706cb9290a9805fa1a2f2ebcc03ec07b818a590b74f38879ea23336d7f11ebebfd54ac274ba8e55f487210ecb9459c3c54df646cc34c967456e36d03fbd6fd696dee0550685974fb6138bf26b2f093ca3d78847bfc9d6caf4804f75953b43805cc364"}]}]}, 0x2ec}, 0x1, 0x0, 0x0, 0x24048080}, 0x40000) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x140b, 0x8, 0x70bd26, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}}, 0x20008040) 18:26:21 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000040)="580000001400ad", 0x7}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_SEQ_NRSYNTHS(r4, 0x8004510a, &(0x7f0000000100)) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) r5 = socket(0x10, 0x803, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@local}, {@in6=@ipv4={[0xfffffff0], [], @multicast2}, 0x0, 0x32}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 18:26:22 executing program 1: socketpair(0x23, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xe, 0x0) 18:26:22 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x3, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 499.074832][T10181] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:22 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 499.424843][T10192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc0e85667, &(0x7f00000000c0)={0x980001}) write(r0, &(0x7f0000000240)="00fb4ab9a04e5112c346bdf63206ff903300e03bca94c393e7791044839cf834f8adf3ab08bb1ed1efbcb57bae8cade6479737e1b493c0fa7c92a13eb54d8897b195a66fd79c421cd3b41ff4f0856b4ebf4623870dee5ff95a7173674ff07780772b4f4a3967c041bff324a89ad718c8ca47e53584a6153e6ca238e7db4c4137d3b2b6d7ce0ea0552106db56c23debb2df6a3052852dbd09733d6a450941ae6b12c5c628fae5bd9b8d99da42109cc46456aaca20f20860ff0cabaa2ea3dba55a477aa548093e6da66dad9f4d5dd2aa958470183631c6be5811ff80bf5075", 0xde) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)='\'\x00', 0x0, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000080)) write$P9_RWALK(r1, &(0x7f0000000100)={0x8b, 0x6f, 0x1, {0xa, [{0x4, 0x2, 0x4}, {0x40, 0x0, 0x6}, {0x40, 0x2, 0x1}, {0x1, 0x2, 0x4}, {0x2}, {0x80, 0x1, 0x3}, {0x1, 0x3, 0x6}, {0x10, 0x3, 0x2}, {0x10, 0x2}, {0x1, 0x2, 0x7}]}}, 0x8b) socketpair(0x5, 0x3, 0x2, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r4}, 0x10) 18:26:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x10, 0x0) 18:26:22 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f00000001c0)=0xffffff13, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc0e85667, &(0x7f00000000c0)={0x980001}) fsync(r1) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x501802, 0x0) ioctl$VIDIOC_S_FBUF(r2, 0x4030560b, &(0x7f0000000180)={0xa4, 0x45, &(0x7f00000000c0)="6a92c663e9abbfa4d800d89b961b96da3ad07ca17b80f0481076e98a5e9dcac86fa65e9e281f1c67e15a05706b997584ead0c0bbf8a87b1a58a2d3202de82c214ff2a8476a32d3a924529c7f06489a94c85d56b1cecb78b19cebfa72039eada455ae33e82f7354e8b44d3002eddff6a92b01b8621dd54fedfa7e3eec96356fae9de62e13bc5eaaec05f468db4f21affa0508d9f3e3539163864768f5c5aec6add166a0571c1737a60d3aa0", {0x8, 0x3, 0x79001012, 0x7, 0xa469, 0x1, 0xc, 0x15a}}) syz_usb_control_io$hid(r0, &(0x7f0000000080)={0xfffffffffffffe68, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x0}, 0x0) 18:26:23 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x5, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:23 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000000)=0xfffffffa) ioctl$KVM_SMI(r1, 0xaeb7) 18:26:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x11, 0x0) [ 500.333409][ T9531] usb 4-1: new high-speed USB device number 2 using dummy_hcd 18:26:23 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x6, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:23 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x401, 0x6, 0x1ff, 0x9, 0x81}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x8) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair(0x25, 0x3, 0x400, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$pppl2tp(r1, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x0, 0x3, 0x2, 0x3, {0xa, 0x4e20, 0x3a2, @private0, 0x3}}}, 0x32) [ 500.603553][ T9531] usb 4-1: device descriptor read/64, error 18 18:26:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x12, 0x0) 18:26:24 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x7, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:24 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80001, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9, 0x4010, r1, 0x460a) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 501.013281][ T9531] usb 4-1: device descriptor read/64, error 18 18:26:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1d, 0x0) 18:26:24 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 501.283213][ T9531] usb 4-1: new high-speed USB device number 3 using dummy_hcd 18:26:24 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'ip_vti0\x00', 0x0}) [ 501.553579][ T9531] usb 4-1: device descriptor read/64, error 18 [ 501.963386][ T9531] usb 4-1: device descriptor read/64, error 18 [ 502.084044][ T9531] usb usb4-port1: attempt power cycle [ 502.822129][ T9531] usb 4-1: new high-speed USB device number 4 using dummy_hcd 18:26:26 executing program 3: statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/41) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x5, &(0x7f0000000000)=[{0x80}, {0x54, 0x0, 0x0, 0x7}, {0x6, 0x4}, {0xcad7, 0x7e, 0x4d, 0xfffffff7}, {0x856, 0x9, 0xfe, 0x10}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0xfffffffd, @private1, 0xff}, @in6={0xa, 0x4e20, 0x1f, @private0={0xfc, 0x0, [], 0x1}, 0x1cc3}, @in={0x2, 0x4e22, @remote}], 0x48) 18:26:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x25, 0x0) 18:26:26 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x9, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:26 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000000), &(0x7f0000000080)=0x10) [ 503.074745][ T9531] usb 4-1: device descriptor read/8, error -71 18:26:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2f, 0x0) [ 503.293420][ T9531] usb 4-1: device descriptor read/8, error -71 18:26:26 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xa, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:26 executing program 3: r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000740)={0x34, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000540)={0x44, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x2, 0x0, 0x18}, 0x18) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f00000000c0)={0x9, 0x9}) syz_usb_disconnect(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000100)={0x50, 0x7fff, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) 18:26:26 executing program 1: socketpair(0x2a, 0x800, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:26 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xb, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x48, 0x0) 18:26:27 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000140)="2399", 0x2) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x400, 0x4}, 0x8) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000100)=0x1) dup3(r3, r2, 0x80000) [ 504.090006][ T9531] usb 4-1: new high-speed USB device number 5 using dummy_hcd 18:26:27 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xc, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:27 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x42, 0x0, 0x0) sendmsg$inet6(r1, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x4e21, 0xf1, @dev={0xfe, 0x80, [], 0x2d}, 0x7}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000080)="d547d87985d6d1616d50296e375cc6d9c40040618db04abeb86d723ffe804093e8eb0733777747361129493f1c2ad3f3523961e201f56a6760035dcfee8d4165866563184606be43c22d5b4002b62f4de499f793d4ce2cedc1383d7430da9cf6466e7127a3a3c81d616784c8cd8a", 0x6e}, {&(0x7f0000000100)="f2ce83f29bbf2494ed38911026aef24efa4a50c14ddfb2ea79e28b17cc4409", 0x1f}, {&(0x7f0000000140)="053ee7f684e96247c7e6d9f52bc8e101a145366d078f9e16c9effcab316d20470b8483f7acd4d239af4c7f618061667a7cb3baf807a79ad24d7269fefb1645992389135cd03bf2915e8c6626bd7f64df49e1faa7d6a374c8c1a66c46197892c1d5c8b0ed71589b6629ed5dda77ec87cdb122a0c6b07446fe6470ffcd9d2b4a2e1849ac5fe66517f2be56b820c94b30eed325a153c3f08993d59a59f0aab8ba", 0x9f}], 0x3}, 0x4040020) r2 = semget$private(0x0, 0x4, 0x0) semop(r2, &(0x7f00000001c0)=[{0x0, 0xfffc}], 0x1) semop(r2, &(0x7f00000002c0)=[{0x0, 0xffff}, {0x0, 0x367}], 0x2) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000900)=[0x8]) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 504.192497][ T9531] usb 4-1: Using ep0 maxpacket: 8 18:26:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x4c, 0x0) [ 504.311698][ T9531] usb 4-1: config 0 has an invalid interface number: 164 but max is 0 [ 504.320183][ T9531] usb 4-1: config 0 has no interface number 0 [ 504.326437][ T9531] usb 4-1: too many endpoints for config 0 interface 164 altsetting 233: 35, using maximum allowed: 30 [ 504.337854][ T9531] usb 4-1: config 0 interface 164 altsetting 233 endpoint 0x85 has an invalid bInterval 0, changing to 7 [ 504.349492][ T9531] usb 4-1: config 0 interface 164 altsetting 233 endpoint 0x85 has invalid maxpacket 1280, setting to 1024 [ 504.361169][ T9531] usb 4-1: config 0 interface 164 altsetting 233 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 504.364477][T10277] Dead loop on virtual device ip6_vti0, fix it urgently! [ 504.372549][ T9531] usb 4-1: config 0 interface 164 altsetting 233 has 2 endpoint descriptors, different from the interface descriptor's value: 35 [ 504.393302][ T9531] usb 4-1: config 0 interface 164 has no altsetting 0 [ 504.516305][T10280] Dead loop on virtual device ip6_vti0, fix it urgently! 18:26:27 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xd, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:27 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000000)={0x1, 0xb4a7, 0x1000}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x48) getpeername$netlink(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 18:26:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x5c, 0x0) [ 504.793099][ T9531] usb 4-1: New USB device found, idVendor=06f8, idProduct=0004, bcdDevice=62.01 [ 504.802516][ T9531] usb 4-1: New USB device strings: Mfr=0, Product=237, SerialNumber=0 [ 504.811140][ T9531] usb 4-1: Product: syz [ 504.871436][ T9531] usb 4-1: config 0 descriptor?? [ 504.894498][T10261] raw-gadget gadget: fail, usb_ep_enable returned -22 18:26:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xe, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 505.068864][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -110 [ 505.098869][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.148632][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.319000][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -110 [ 505.351282][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.378398][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.400149][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.436506][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.458679][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.488750][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.514088][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.541082][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.559759][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.579463][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.599035][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -32 [ 505.628507][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -71 [ 505.650049][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -71 [ 505.672470][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -71 [ 505.699092][ T9531] iforce 4-1:0.164: usb_submit_urb failed: -71 [ 505.705414][ T9531] input input5: Timeout waiting for response from device. [ 505.745315][ T9531] usb 4-1: USB disconnect, device number 5 [ 506.417218][ T9531] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 506.656673][ T9531] usb 4-1: Using ep0 maxpacket: 8 [ 506.778131][ T9531] usb 4-1: config 0 has an invalid interface number: 164 but max is 0 [ 506.786565][ T9531] usb 4-1: config 0 has no interface number 0 [ 506.792833][ T9531] usb 4-1: too many endpoints for config 0 interface 164 altsetting 233: 35, using maximum allowed: 30 [ 506.804244][ T9531] usb 4-1: config 0 interface 164 altsetting 233 endpoint 0x85 has an invalid bInterval 0, changing to 7 [ 506.815771][ T9531] usb 4-1: config 0 interface 164 altsetting 233 endpoint 0x85 has invalid maxpacket 1280, setting to 1024 [ 506.827431][ T9531] usb 4-1: config 0 interface 164 altsetting 233 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 506.838820][ T9531] usb 4-1: config 0 interface 164 altsetting 233 has 2 endpoint descriptors, different from the interface descriptor's value: 35 [ 506.852452][ T9531] usb 4-1: config 0 interface 164 has no altsetting 0 [ 506.997141][ T9531] usb 4-1: New USB device found, idVendor=06f8, idProduct=0004, bcdDevice=62.01 [ 507.006517][ T9531] usb 4-1: New USB device strings: Mfr=0, Product=237, SerialNumber=0 [ 507.014939][ T9531] usb 4-1: Product: syz [ 507.050120][ T9531] usb 4-1: config 0 descriptor?? 18:26:30 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="ff0100000e6860082d080001a3f2000000010902120001010000000904"], 0x0) io_setup(0x3761315e, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000200)="7834564b43637e16fcf8ac05", 0xc, 0x9}, &(0x7f0000000280)) syz_usb_disconnect(r0) r2 = syz_usb_connect(0x0, 0x1b, &(0x7f0000000200)=ANY=[], 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) write$FUSE_IOCTL(r3, &(0x7f0000000300)={0x20, 0x0, 0x0, {0x0, 0x4, 0x1c, 0x6}}, 0x20) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x101, 0x1c0e2bf}) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f0000000100)) syz_usb_control_io(r2, 0x0, &(0x7f00000008c0)={0x84, &(0x7f00000000c0)=ANY=[@ANYBLOB="002c0600000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 18:26:30 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x68, 0x0) 18:26:30 executing program 1: socketpair(0x27, 0x800, 0xfffff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:30 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x10, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 507.166298][ T9531] usb 4-1: can't set config #0, error -71 [ 507.198635][ T9531] usb 4-1: USB disconnect, device number 6 18:26:30 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x11, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:30 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x6c, 0x0) 18:26:30 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = signalfd4(r0, &(0x7f0000000080), 0x8, 0x100800) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000000)={0x1, 0x3}) [ 507.775383][ T9531] usb 4-1: new high-speed USB device number 7 using dummy_hcd 18:26:31 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x12, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:31 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x74, 0x0) 18:26:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000100)={{0x4, @name="01a99c478a27193aea7e9f2bb54dc5013d677159eb7b442004f606124af5acaf"}, 0x8, 0xfffffffffffffffe, 0x5}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x4}}, 0x20) [ 508.015564][ T9531] usb 4-1: Using ep0 maxpacket: 8 18:26:31 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x7a, 0x0) [ 508.166186][ T9531] usb 4-1: New USB device found, idVendor=082d, idProduct=0100, bcdDevice=f2.a3 [ 508.175662][ T9531] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 18:26:31 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x25, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 508.484311][ T9531] usb 4-1: palm_os_3_probe - error -71 getting connection information [ 508.492919][ T9531] visor: probe of 4-1:1.0 failed with error -71 [ 508.575064][ T9531] usb 4-1: USB disconnect, device number 7 [ 509.036475][ T9531] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 509.283195][ T9531] usb 4-1: Using ep0 maxpacket: 8 [ 509.416992][ T9531] usb 4-1: New USB device found, idVendor=082d, idProduct=0100, bcdDevice=f2.a3 [ 509.426521][ T9531] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 509.725163][ T9531] usb 4-1: Handspring Visor / Palm OS: port 0, is for Generic use [ 509.733501][ T9531] usb 4-1: Handspring Visor / Palm OS: Number of ports: 1 [ 509.932682][ T9531] usb 4-1: palm_os_3_probe - error -71 getting bytes available request [ 509.941356][ T9531] visor 4-1:1.0: Handspring Visor / Palm OS converter detected [ 509.974444][ T9531] usb 4-1: Handspring Visor / Palm OS converter now attached to ttyUSB0 [ 510.014918][ T9531] usb 4-1: USB disconnect, device number 8 [ 510.055617][ T9531] visor ttyUSB0: Handspring Visor / Palm OS converter now disconnected from ttyUSB0 [ 510.066516][ T9531] visor 4-1:1.0: device disconnected [ 510.721909][ T9531] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 510.970918][ T9531] usb 4-1: Using ep0 maxpacket: 8 [ 511.101576][ T9531] usb 4-1: New USB device found, idVendor=082d, idProduct=0100, bcdDevice=f2.a3 [ 511.110879][ T9531] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 18:26:34 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xec, 0x0) 18:26:34 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RXATTRCREATE(r2, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RSTATFS(r4, &(0x7f0000000080)={0x43, 0x9, 0x1, {0x1, 0x6, 0xa05c, 0xded, 0x3, 0xff, 0x81, 0x7, 0x101}}, 0x43) 18:26:34 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x5c, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:34 executing program 4: r0 = fsmount(0xffffffffffffffff, 0x1, 0x70) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x605, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x3}, @NL80211_ATTR_PRIVACY={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000100)={0x5, 0x0, [{}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, &(0x7f0000000200)=0x1f) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f0000000280)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x88b77102dcc33d79) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x2) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nvram\x00', 0x10841, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x2}}, @NL80211_ATTR_MAC={0xa, 0x6, @random="71e056b2eb29"}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x6}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @random="f011dd7d24cf"}, @NL80211_ATTR_OPMODE_NOTIF={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x24040814) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000600)) sendmsg$TIPC_NL_KEY_FLUSH(r3, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000007c0)={&(0x7f0000000680)={0x138, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x17}}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @ipv4={[], [], @multicast2}, 0x100}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x38, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x30000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40810}, 0x20000090) ioctl$MEDIA_REQUEST_IOC_QUEUE(r2, 0x7c80, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x3b8, &(0x7f0000000840)={[{0xb, 0x4e00, "a40536499b6185a2c3c755"}, {0xa0, 0x4e00, "3183fea8f70b7e8b1f1deb0f9cdf0f6270899816f600e0c442b8619d691bdff9d06480edbd3d234a2d1df3656ee7e054c0bea26b8ea6e5cd90d5bbee592dec5701b5566fcebc24845f4aecbfb3bfb835ad26219703faed651a0f47327fc8562b922125661fe7d25554e3658ffe59e4c098f92f5d737a1733fb26a72e7f7b08f2a2d906a9af732925f4661929ccfc98f761bafbd642f4cc6e8f269612b2562b0d"}, {0xff, 0x4e00, "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"}, {0x67, 0x4e00, "8a24fe30767c3e99733ee64392b625c52291540022e9f0031b7f140c3c68d628da959c5dde412c649e593d29f560308ab6af55a4bd9043076d539df4f8769ce8f07220c4c358d5c33cd5abf98857f0f952b53f88b7740c8e5ed1bbbc6d1bdcd246d91d34e2375f"}, {0x93, 0x4e00, "f34437495069d5fccb23723ec8f25ad4d47ed3cca113a055042ca972ac2167e5c6c43edc85b37051c18704d51a503941314281f02539672ee8838ee1a4840e86609c5ae13ce6270ddd90db5a014f47b65005610a21762fd4413a5c38e33b5dc0ea93abdef8e9d85f1f7883bb313575f63f195ed86704f0b1d25ddaa2aa98983c0381c9f0bdf4ec1b432c7bea04054bd05d0e83"}, {0xf8, 0x4e00, "5a2e693cb7710b045989382fdaedbd7cee386a8412644b86c470193c9411d6b3db8ce40963a955054e80017563d4a43698339b54add05805e95ae3196130cbce67da392ad87a9924aa6dd46aeb9555b271732be53e8e53e9efe7759201b9b087d083d021c4eef633621e1c41d02b6e74176c9d23688da5bccb9059ccfac8baa24b02e98fa0ccee20e95c9a6a1cc01c4e69147a8fa995c88828e7571395aaed4159b6f27cda8c23a6c0b8edc5f230b7fde27b5de3ee51f963b7315f0e9d5f1e97d5bd1eec04b225e386cd5e2e0b9f139a43b9a54743a3760aa8558ac12cc0fdae7fcfc1b12efec2e777aab7b1c4822080a1be3f06b95a2077"}]}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x80, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/capi/capi20\x00', 0x60000, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) sendmsg$inet6(r5, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000c80)="2412e8aa7e449695d9a770c6747ef04f88d46a2177a5622526c3357a49afdc19b57c197b0ff3a4348a69e76d27d791e763a81a8e8c7a41", 0x37}], 0x1}, 0x48890) getsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000d40), &(0x7f0000000d80)=0x4) 18:26:34 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r5 = socket(0x6000000000010, 0x3, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x492492492492778, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x5}, {}, {0xc}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x1c, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x4930}, @TCA_FLOW_POLICE={0x10, 0xa, 0x0, 0x1, [@TCA_POLICE_RATE64={0xc, 0x8, 0x9}]}]}}]}, 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x29, 0x7, 0x80, 0x5, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, 0x1, 0x8, 0x8, 0x7f}}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/if_inet6\x00') dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4000020004ffe0, 0x0) [ 511.393544][ T9531] usb 4-1: palm_os_3_probe - error -71 getting connection information [ 511.402253][ T9531] visor: probe of 4-1:1.0 failed with error -71 [ 511.509584][ T9531] usb 4-1: USB disconnect, device number 9 18:26:34 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x300, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:34 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xee, 0x0) 18:26:35 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 511.990253][T10438] bond2 (uninitialized): Released all slaves 18:26:35 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000280)={r0, 0x0, "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", "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"}) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000000)={'veth1_macvtap\x00', 0x3}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:35 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x500, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:35 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xef, 0x0) 18:26:35 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x600, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:35 executing program 1: socketpair(0x1e, 0x800, 0x1f, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:35 executing program 3: ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000500)={r0, 0x7, &(0x7f0000000140)=[0x5, 0x400, 0x7ff, 0x5120, 0x1, 0x0, 0x1], &(0x7f0000000440)=[0x3f, 0x47cf, 0x80, 0x9, 0x7, 0x402], 0x1, 0x2, 0x47, &(0x7f0000000480)=[0xb5c413c2, 0x80000000], &(0x7f00000004c0)=[0x1]}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000)=0x6, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="44010000100013070000000000000000e000000200000000eb00000000000000ffffffff0000000000000900"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x144}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x8, 0xdeb, 0xb26c], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r4, 0xc1004111, &(0x7f00000001c0)={0x9, [0xfffffffe, 0x9, 0x4], [{0x3, 0xdc, 0x0, 0x0, 0x0, 0x1}, {0xff, 0x7fff, 0x0, 0x1, 0x1}, {0x1000, 0x6}, {0x7, 0xfffffffd, 0x0, 0x0, 0x1}, {0x1ff, 0x5, 0x1, 0x1, 0x1}, {0x1, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x8, 0x5, 0x0, 0x0, 0x1}, {0x6, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x854, 0x1f, 0x1, 0x0, 0x0, 0x1}, {0x168b, 0x7fffffff, 0x0, 0x0, 0x1, 0x1}, {0x8001, 0x7, 0x1, 0x1, 0x1}, {0x8, 0x5}], 0x3}) sendmmsg(r3, &(0x7f0000000180), 0xf1, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000540)) 18:26:36 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xf0, 0x0) [ 513.121245][T10460] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.3'. [ 513.216828][T10462] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.3'. [ 514.478988][T10477] IPVS: ftp: loaded support on port[0] = 21 [ 514.978066][T10477] chnl_net:caif_netlink_parms(): no params data found [ 515.182565][T10477] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.190076][T10477] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.199817][T10477] device bridge_slave_0 entered promiscuous mode [ 515.213282][T10477] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.220749][T10477] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.231039][T10477] device bridge_slave_1 entered promiscuous mode [ 515.286865][T10477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 515.304813][T10477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 515.363335][T10477] team0: Port device team_slave_0 added [ 515.377389][T10477] team0: Port device team_slave_1 added [ 515.419172][T10477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 515.426454][T10477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 515.453853][T10477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 515.478096][T10477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 515.485759][T10477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 515.511970][T10477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 515.574724][T10477] device hsr_slave_0 entered promiscuous mode [ 515.593438][T10477] device hsr_slave_1 entered promiscuous mode [ 515.603466][T10477] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 515.611443][T10477] Cannot create hsr debugfs directory [ 515.903744][T10477] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 515.946462][T10477] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 515.990607][T10477] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 516.009041][T10477] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 516.379891][T10477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 516.442306][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 516.451583][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 516.464863][ T8709] Bluetooth: hci4: command 0x0409 tx timeout [ 516.478662][T10477] 8021q: adding VLAN 0 to HW filter on device team0 [ 516.522602][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 516.532909][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 516.542466][ T8707] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.549784][ T8707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.621230][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 516.631172][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 516.641313][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 516.650772][ T3218] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.658105][ T3218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.667243][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 516.678255][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 516.706016][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 516.716643][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 516.759769][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 516.769587][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 516.780196][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 516.791090][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 516.800749][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 516.849921][T10477] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 516.863876][T10477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 516.897153][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 516.907223][ T9531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 516.968302][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 516.977146][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 517.011925][T10477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 517.083047][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 517.093804][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 517.163840][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 517.175220][ T3218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 517.211261][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 517.221021][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 517.238305][T10477] device veth0_vlan entered promiscuous mode [ 517.292196][T10477] device veth1_vlan entered promiscuous mode [ 517.384500][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 517.394232][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 517.404259][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 517.414178][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 517.446964][T10477] device veth0_macvtap entered promiscuous mode [ 517.472311][T10477] device veth1_macvtap entered promiscuous mode [ 517.535625][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.547443][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.557562][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.568163][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.578592][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.589134][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.599141][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.609676][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.624128][T10477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 517.635174][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 517.644899][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 517.654291][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 517.664313][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 517.699097][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.711068][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.722558][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.733147][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.743111][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.753732][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.763802][T10477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.774388][T10477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.788750][T10477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 517.797189][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 517.807438][ T8709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 518.532912][ T8709] Bluetooth: hci4: command 0x041b tx timeout 18:26:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r2, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0xee01, 0xee01}, 0xc) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f0000000600)=[{{&(0x7f0000000040)={0xa, 0x4e1e, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0x2, 0x4e23, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@hopopts_2292={{0x18}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r3}}}], 0x40}}], 0x2, 0x0) 18:26:42 executing program 1: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x640181, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000080), 0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:42 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:42 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xf1, 0x0) 18:26:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xffffff30) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000020000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0x6c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x38, 0x2, [@TCA_MATCHALL_ACT={0x34, 0x2, [@m_simple={0x30, 0x1, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x6c}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x7f, 0x7fffffff}, 0xc) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 519.189690][T10700] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 519.329334][T10710] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:42 executing program 1: socketpair(0x27, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x8000) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="330128bd7000fddbdf25010000000800030004000000180001801400040000000000000000000000ffffac1e010108000300040000004400018014000400fe800000000000000000000000000028060005004e200000080006000100000008000600040000001400040000000000000000000000ffffe000000220000180080003006401010114000400fe8000000000000000000000000000aa"], 0xa0}, 0x1, 0x0, 0x0, 0x4008880}, 0x8080) 18:26:42 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x900, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:42 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x300, 0x0) 18:26:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x9, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) pipe(&(0x7f0000000040)) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x3}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) close(r5) dup2(r4, r5) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockname(r4, &(0x7f0000000140)=@xdp, &(0x7f0000000400)=0x80) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000240)) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x611ed}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x2}, @IFLA_MTU={0x8, 0x4, 0x1005}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xeb8c}]}, 0x58}}, 0x4040) 18:26:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x0, &(0x7f0000000000), &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 18:26:43 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xa00, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:43 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x30e, 0x0) [ 520.076530][T10731] device gretap1 entered promiscuous mode 18:26:43 executing program 1: socketpair(0x1e, 0x4, 0x7, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r3, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f00000000c0)={'wg2\x00'}) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x150, 0x400, 0x1915}, 0xc) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x101040, 0x0) ioctl$CHAR_RAW_BSZSET(r4, 0x40081271, &(0x7f0000000180)=0x10001) 18:26:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000000)=""/173) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x101280) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000140)={0x3, 0x3131354f, 0x2, @discrete={0x9, 0xff}}) 18:26:43 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xb00, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 520.609952][ T9531] Bluetooth: hci4: command 0x040f tx timeout 18:26:43 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x30f, 0x0) [ 520.893386][T10754] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 520.986708][T10758] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:26:44 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xc00, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:44 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x3d) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r4, &(0x7f0000000300), 0x128, 0x0, 0x0) setsockopt$sock_int(r4, 0x1, 0x28, &(0x7f0000000040)=0x240, 0x4) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000440)={0x4, 0x6, 0xf8, 0x2, 0x3, 0x2, 0x1, 0xac, 0x0, 0x81, 0x2, 0x8, 0x1, 0x7}, 0xe) r6 = socket$rds(0x15, 0x5, 0x0) splice(r6, 0x0, r3, 0x0, 0x100000, 0x0) 18:26:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000000)=""/173) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x101280) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000140)={0x3, 0x3131354f, 0x2, @discrete={0x9, 0xff}}) 18:26:44 executing program 1: socketpair(0x28, 0x2, 0x80000001, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pkey_free(0xffffffffffffffff) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f0000000000)=0x8) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x7, 0x3, 0x5950, 0x8000, 0xfff8, 0x59bd, 0xffffff81, {r5, @in6={{0xa, 0x4e23, 0x6, @remote, 0x4}}, 0x7, 0x3, 0x3, 0x3, 0x8}}, &(0x7f0000000140)=0xb0) 18:26:44 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x310, 0x0) 18:26:45 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xd00, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:45 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'syztnl2\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 18:26:45 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0xe00, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ttynull(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull\x00', 0x841, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, "b9e5cfb41cd9d75651fa684fbeca702b211a82"}) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)='\r', 0x1}], 0x1) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000000)) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b5b07073100345d00000000000000000000000000000000000000df000000004000000000000000000000000000000400000000000038000000000000000000"], 0x40) 18:26:45 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x311, 0x0) 18:26:45 executing program 1: socketpair(0x11, 0x800, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'gretap0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x7]}, 0x8, 0x80000) ioctl$vim2m_VIDIOC_STREAMOFF(r1, 0x40045612, &(0x7f0000000100)=0x2) 18:26:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="5400000010000507000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800c0001006d6163766c616e001800028008000100100000000800030003000000040005800a0005000400000000000000"], 0x54}}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x7fff}}}, &(0x7f0000000140)=0x84) [ 522.688871][ T5] Bluetooth: hci4: command 0x0419 tx timeout 18:26:45 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x1, 0x400) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="640000000208000100000000000000000c00000805000300060000002c00048008000140000001400000008108001840000000f92f04a24000000540050003003a00000006000240884800000900010073797a30000000006ab52616f4225ffb"], 0x64}, 0x1, 0x0, 0x0, 0xc800}, 0x40800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000000)=""/222) 18:26:46 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x312, 0x0) 18:26:46 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x1100, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 522.956902][T10806] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 18:26:46 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:46 executing program 4: r0 = socket(0x10, 0x800, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xb9) r3 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000140)=@generic={0x2, 0x3f}) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700005b0000000000000000009306b355c2b7cc6a31fe0e42f3a67029ef75e8890317e1cdc95cac01367a217d5654d26768756a357987d74d3cd5ee6f8ff6789ebf47270f9889bddeb54cfd74fadd622af8b1", @ANYRES32=r4, @ANYBLOB="78fdc0c8c1a2c274a9b1940dd35f7cdc9cee1c7ee850c0260726e8a59a20ad3279ada8f3e20db4730cedb82834819337d50b5acd6af8d424464458c792310b28f5146fbaa82c42da8fc660255f79e866007d929404009afa4857515a1b2e7bfba2c5b7743f292e0af126bb60c237a52fb0b3c252272673601c743a9cacb58384ae2995377476ce3de1a39feaa42bf9ff6fef6af532200c270cf2baf79669815d931672e335cc9e3e3168fddbae2d1b7f0f45395d42754ec627531182b158d1d63241dc9d22181e101770cde503cf5f7836e6d393fe5e"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0200180001000087a0ec1e8b2ec9f665f2f9db71066e00"/49], 0x48}}, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getpeername$l2tp(r5, &(0x7f0000000240)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = dup(r6) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x84800) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_SETPLANE(r7, 0xc03064b7, &(0x7f0000000080)={0x0, 0x3, 0x8, 0x275d, 0x6, 0x3, 0xdc30, 0xe86, 0x0, 0x2, 0x6, 0x3ff}) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 18:26:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x1c) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x8000) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000080)={0xe941, 0x200}) sendmmsg$inet6(r2, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 18:26:46 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x500, 0x0) 18:26:46 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x1200, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:46 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc0e85667, &(0x7f00000000c0)={0x980001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_SOPASS={0x83, 0x3, "c785e920c2eb0db6663895abd54cfbbeb11d3e4dec162c879f1acc11b83f48cce165975948772b46093e225c7e8afe0e55ae84da58ad5dfea9dacf904e19c9a5c14bd69e2954b887d8aad21073e3952dfee03ddc316cda30ef28ea7fe218f8ee5829306fa2608e158ab99ef8c81f8a44ae2be9b2d34e748b012810e9ca6519"}]}, 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0x84) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000140)={'syzkaller0\x00', {0x2, 0x4e21, @broadcast}}) r5 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000100)={0x0, 0x6, 0x0, r5, 0x0, &(0x7f00000000c0)={0x98091c, 0x8001, [], @p_u32=&(0x7f0000000080)=0x2}}) [ 523.603307][T10820] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 523.717579][T10824] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 18:26:47 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x600, 0x0) 18:26:47 executing program 4: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000002447f3b68400000000904000000ff010000022424"], 0x0) 18:26:47 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2500, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="5001000010000307ebfff40606c6000040041200", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010000000250012000800010076657468"], 0x200}}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a3e, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ptrace$setregs(0xd, r1, 0x2, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x5, 0xffffffffffffff00}, 0x4020, 0x0, 0x7, 0x5, 0x2, 0x7beb}, r1, 0x0, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000100000000000012"], 0x1}}, 0x0) r2 = socket(0xa, 0x2, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000980)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000680)=""/79, 0x4f}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/240, 0xf0}, {&(0x7f0000000900)=""/114, 0x72}], 0x5, &(0x7f0000000ac0)=""/143, 0x8f}, 0x140) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) 18:26:47 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = getpid() ptrace(0x10, r1) ptrace$peeksig(0x2, r1, &(0x7f0000000400), &(0x7f0000002000)) tgkill(0xffffffffffffffff, r1, 0x2b) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 524.394930][ C0] hrtimer: interrupt took 66331 ns [ 524.430214][T10843] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 524.440808][T10843] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:47 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x5c00, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 524.675386][ T8707] usb 5-1: new high-speed USB device number 2 using dummy_hcd 18:26:48 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x700, 0x0) [ 524.944209][T10843] team0: Port device veth7 added [ 524.984843][ T8707] usb 5-1: device descriptor read/64, error 18 [ 525.039120][T10843] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 525.049487][T10843] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:48 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0xa000, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000080)=[0x9, 0x8001]) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 525.374439][ T8707] usb 5-1: device descriptor read/64, error 18 [ 525.541221][T10843] team0: Port device veth9 added 18:26:48 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 525.644629][ T8707] usb 5-1: new high-speed USB device number 3 using dummy_hcd 18:26:49 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:49 executing program 1: socketpair(0x1d, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, &(0x7f0000000080)={{r1}, "249c6be1015ba6757aee83f7ca6cc9992140fbed890f29eeb44576ff17a06f67e2b7796a50600c398ee914d86e54799bbf1429fc9aefca8320c528b1baf5e0ee5638cd30b6723d1fc14af0ddd98068e5a222ae15f5b71205fea81959288fc8e933b34719ba13eff18e9efe3dcab0e592e182468af4309eddbb59f0e3875e0f86d7a4ed6ccfc2aa765b07667689967e582848b60ef71271e7c8b867d8bb728364f2b8859e64b9bdb46e4703ca6a22a32d34899ed4e6625080700c79add3f85b03402a9b83b42f59e064267b3a3e88d37e76e090f4d3250d089d80618afeddaadbab2384e48edcffb0e85c45c0552c886810a160f91ed35d39bfcb03df9e26c88f94351e824c8478e995048778d83b2c5038c394e1249eb123f066e500c98732031501cf0c4a1391a273628194ab3e1b724f60ef82e001ffff2f3d031e7e428b06d87dd21acdecf9012a145fe2502ba9b3d0992419bf87df9cb8d01b874cbbd6f1f57f150f662c0bc8830494dee4b04146a10ac81461fdd5b21bfcdf8b2118a78c5bc1fd105e7e6053938b1366eb33c36ee06ad689b789e2c57074168474a02b1111e1702b8eb36ae06a47969d78a072632a2904ae0c0df25bcdc5ec93ab4dd6cf40287277bd5926a962a14cf50a7c107b583da9889bf8055df289d850a395f19f0f31500cca9e981bebec8352fe2a574732114d3999318f9c56f3b64aa00ee1423a7e2257b631c20efee6183a6b7f04fe63424f2b5176e768d418e534bc16cf464bd681072d55c3d4ac325a565b493cceb4833be579a281477f7a4ba232ba7cb34cda243fab392b61ee3ae39476fe9b12d47a0ea9687274fdf39daa45162401ce503b7b257566fc598b3bc8e5f31554f832f16d9f1f901abf0dfa04ac7f541823fd1a7518756d36649c2fd54edf9bb367a084bd97ff28018118bc3ccd5bcb221aa7ae9a8dfbf5a9a30f6152f005dc85cd34bff765e3a1b9698983a0bf2d418aa6167242bfc1fcfe80facc03b64391dfb75186b366a75b37e1025284d4541a02e81f45aa794a456f606558ff61e722ed1ae8c540481e3c8561d353c43fc5818e4affb7afb1f257e5fde45abd216d443c16cbd95208b907b1321b7893eb33c7824429fec6045baa574b8e4f5324bc90954527dccb542d3b5e60550dbd59340624e7f23867c9c279536aa3c43ba0ceba228c54acd442130873ea2cf11a82ba3e8d3048f2fc5b2de05b0a027b16838043743a91e51d9fc42689edc0703c926d26196af901fdb7b2b1328e218e8fafea9ac76784ed9d551a746c66a29f4e54906aa18be4739f8b84f82a2b95789e8df9057ff3b4cbc85a14da9162742be89eabdbcd7a4d4acf5d91ee6a3c6d1e61846f6e872bb1de87a3bc97af1a7dd95725ceeb1e3b784f9611e408aecb6d15b96f081889e352f6ce61032d0adfd57bdd73021234fffc58f1cefb891defa869f03cdf38e4b9730365bcbfe4b2b3c3d0ed696e44147c3f3e500f62dfb014d3686d9e674342db82d28662fc600749d466a0f6b9ae2fa47677e896f3c6564a4cd860bb838c4d57f9407100fa5115a95d5a0fdcafb0fc5d0b77038b73d51772d1442c8601bf3df073971e4dd114493022e8b0d29a4f89c01013ed4af587fb361f1ac697dba9f5ceed35e7775a34f8b2086d30c169674e1341a82c488f45d55aa18634c4522c7d7606f21c07fef8f61ec940beb5b1fbd4cf2e2ff03dc011341c9d3d10dbb400d4006bbae9eeeeacad773771cae0d88792854626f7fc11f3fc4b4a522737c08253bfbf36e7963ae68ac788a9e3153b2b323091ec83ca56add11a40286be25087df68bef3bed470b5f2a67348281d7d69defa2cb6c227b9bd65ad7fc78731fb4efc6602f3a4f86b9ac1b267583cc2b86a2b62212c4cd1a76cc16da2d4c88718a7c8186ab6bf07d27827299d1018263d12d64c0ea9f16458e04ffa041b7b7d20ebc7c8365d80bd92250833eb642f5f4d840366ef3a9c79f82960d77f750c6d622f95b09ddc681a8554e75043dc74fb9d0091e80654fea9f0ad9e9b77430dff7c8bf4a3c016eb40500230024cbc08ef03df5dc569024d49e85902f899dfc43ff8263565b44bcfb5644afef48cdad07e02ce6acd0169729c9f213acf05c620b57b9fee1672e37b11707d599eeb98a6b8a2620d37325ec26b8e64121f402737dc1aba1ee6fb5a4798a4e80f454529c717be1e022db28d5150c3daf15fc4d5cd988c05958fd9b35a7fbf69d8e287d7ec561d198975b59905890119652ec820c845da414d7e58ef8e4ffeb24b96e88048ca9a4da6c4705c85bb90ef68d0938d4df75e22cb4a4f7466b0480b9413cbf184eac135670606876de29d423adc9b580297a3905f8638769c99d9ff72343d206bc51b92d40c2886725be1dc9e3429a498f787ea578a287855f9fa0657fcf68620bdaf79e8ff1ac3a15f156875014779420aae40d0d15d87501f5e318924e04ab25e8e82e64679a296c53c5f801d0f5371ab27f79c5702e8e0ccd097d3433c36888a1dc9b330bf9f2b0b5646d8fa24205df9e51fd914294e65c0648482db60fedce8d7ef8a4d16ec9707a9d805ac8356047b17921e6ee79b7c3ffc715129d18fb6a61f1f8adbb5d0af6b72bbb52235ae0eadd870d849ab9d2f3f6f8be0edd8ab3604700c71df6bdbbae5fccfcd8cbf546298527ab564b72e31f6708295dc18bcabcb613c1df800129c1f6eadb813da52237f39bd9b6afaab80d97d5ef5a134d81bbb01cff280b3854744059b6d150906a8846de4ab3fc3e78d44d308053b4541cad50a5d3766331adcadda49005b17720440a976421f5d9a8133841e9c606676d8908eb2a6bf0bfa004848be09099aedb7158d24328422e1bc1c1924afc4fa834e0fabb8dfa3ac0191d07a6f334a874a360416116c7346aae07c0d874925b62c0f60d842e5421677984e1a667d1cbb243dd50e0d553f98e6a1fb52a8cc928653d4074a826020d759371c60374157eff24531460e36fdbf31e120e8cc5aa0bbdc67b010e6a70aa76e08bea481ab20140f8851bf8ff36d39b2745ecd0b1513b5866c21b755a767f2087ff5d162e25ab1e65437d0f7ccf6ab5b915c8847903febc7a84099c2325104ff3481f2e28dbdc2fd1df5fd4f4d4b7041d446f65132559551d042d113a81b9b48a31e333cd998c9923929f7d6a886da99cb25b86e5ccb4d9c5cc575107d49a6cb7d1f76bffa37b9680e7c20ee39df35a793da48bbf3462a05b3d3a861305a0a953d9df8b759d868927bd5fa0343081c02fb8cd7d26b2ad1a707e57efe108637e809f5e58388909ef936bea1a91443c96796f67fa48b5e676d82cc57f553cee12fabde5ad3c6dbe5f8fffcfee6da6309b82607b4337b7d8e777c62fbf93ef59dea3c3867c1c67ec118d54cd0e9fad1590d2f6c43275d0b1ff1f75f4049dc0a59d1ba1d37d2b89969ba0183b4d6c38e036f487b66238bb3ea688c74575bd381c75bc604173e69c6eef97481b1710bdeee333fa30cd3d06569f8018e026e2fb8272a26d116c3ddf1aaf8ea23bd8778604acd3f14a1c918f155745e9b6514cea99977b93ad37182371e701b9683117b77f426a4fa7d6b612f0fd4240f4b136fec647deb9876b5d0fc4dd38a20b753a1f34298d911a6fef29e193368853331697622f9b0d5d6d72d839cd5e8b05cc01e6d21b81c8e1481e3ee077789c57147681f3dcaafdfb588ae254b1e830ff0897a76b09e4cc4020a97c05f3408abb4de8986659b89a176e77e02c8c47b9273676c859f7d674abfb0e67dabd178ae8fb52b1149f15b49d3c044182f5cc6066c958975f1fbcc0cc504643fec3ec14b0515f69be83a8ba8b3a77a7ba53099d2828d5892b3a87baed072de24a355aa8567597cb34cf6f2e425b7f4e575f149c01df6dc686a9b89f4dd2bd69377161aa17864ee6b69c9c210778324cad8a9ac2e92310b79042ad3428164b16dfec7b1b458b5627f7728a896dd0b29232c2dc9215f995edf2d39c4e2e9a80b664e1d165c33606f3c3ce6b70d4d7f97bb31535c5f5bdcb84410ed1e694333a37b1ff99b5ec1da09c5389fd7924d0eb89c5715f3aab4aa279ec7d0a5f89aa8cfd92bfef22b7121e4840bee3c447b5be30053da0a02aef8e6a58960276073e2124faad0aafa9184eea36ea9734ccd48408477e28f1957a3f8f578e0e8dbee5f1fab86b1291dfcc0646ba59cd927df8be04a38eb3ac032df78ff530f423fdc2e2509f2229294cbc182f57cf0e1e26f97f09f3d79a27a6e612bd5c17c63350b83c313d66d518a0afa00353a24b8c0c795c5404e799ace773bf3f2dab145283302370e32641e038965b3d2d4ca2feb80ea2a9f6673486226649350b3b6ccb56aae70931c2dbccc908e52860a540adaa6c799b55f3841d3e3abc0b90a7cfa58d76671ec308feec274298551bbc927f1dac56ac1eb3b8f1e6f3d51fdecdc9a55feae3dc8707b253fbe23968c1bb3691bad6ba51cacb51ea97e1214271de5ffe3426efafd34bb5f3d34176f089e3935fd37a165ae25928106baaff2105c8a3787cdb13647fc01a70061c0c335bf28bf9d649d846aca09c11aa77637140af161dc32764c3f7f4097ef9ebb66de9adcb0b9275a31edcd6eb406fc38472272e33aa19355159b70b6273130997274c71dc637f6509bf2709d73be1f946ff13007317ec42cd5b17e10c5a0e36ed6dc2d665af9d0ae7ddd3ecc36a090e2f7667b5079ff5d5f0fcef511f8b0bba318e047a59af26c5e93e58466eedac26cf6bc219448e8067d5b11cc79dab937d2172a83cc8c71dcfb304996dcbd80f47fa3897c8e0ca9568b3269899cf0e8d3d2bdc9269473786027d269f63a9c84d91d03c4c5df9653c3b8d1f33ac2125209ed4f510dd4f34d62da292b50901bba19ec5b7ff6bda37930db1c84a8c0f043e0c3752aaf341c8595864d8e5cf0ac5cab895e8a0665205a463476af69bc34333b8cfb43024636dc371577a019894345e78561f03ec13d249c39aadbbe7768468beadcb5cbe53008e9d3da8c7e00d07fd4298feb54b0f8b49615fb22a499ba707f84ff148e0a2e100aa4770d9db9d0f7805c6d2aeb6fa53627f6b770ffd161016213d774575d33e8974dfe4c47978c6711e678d95dabdba6752f726a52d5f0f8d4c3a231e1da55107dcbbda98b674752f42bc4f1dbc9f5c074130a62adb4e047e6a7527854ab798c93802b99ddd1ff164d6722707ff349dd26d1baee97b2062c122ba30e18d0ba3c1a5d6e312c7b96f5fecaa759cd082ccab3d4c659ba3e5390e49f3d17491eaf7d3f9b9c07c037de608032c161074a8a1b33d34fbe09812f6a7f42157a3e6f80cdc5eb5122658866b3464fb318290229794a3112ab5b79c7775d568d002a74bf75c501e8cf6d3f7e22f67dfa393f036dfeb9201bd78d26013140975f4e13144e5c511b80c52b66b362e6b6990a06efe6618756e4f64d35a86fb3e73a08079c29cd9158e385deb4d85d3aa9354a5891fec63eace96f026fc8bc01845b40f623e2d1f61122e207c693108c44b4d2381358193c527d3cba50082bc1cb07f15736c2c66ef2f0492ee4557029dd0ecdc8cdabd6eba34e20aad681bab965486a161ae5b63bb9b73f54858dc99909e8c4a261b8c0b9766f3baa0735cdc815f42b26597a08c5e41d5d3678bf47108729b9a555c70509720425a4b020b1323dfbe7f67bc2eb43063d46f8a60609888306db5ad4c2448697df8be577db6fa195a1c1ed1c4f8c53745d623c7734e163b8d683becdeef050e18690"}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 525.915534][ T8707] usb 5-1: device descriptor read/64, error 18 18:26:49 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x900, 0x0) 18:26:49 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 526.303830][ T8707] usb 5-1: device descriptor read/64, error 18 [ 526.310645][T10876] can: request_module (can-proto-0) failed. [ 526.379926][T10876] can: request_module (can-proto-0) failed. [ 526.426672][ T8707] usb usb5-port1: attempt power cycle [ 527.133132][ T8707] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 527.224693][ T8707] usb 5-1: Invalid ep0 maxpacket: 59 18:26:50 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x102, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 18:26:50 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xa00, 0x0) [ 527.383690][ T8707] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 527.503426][ T8707] usb 5-1: device descriptor read/8, error -71 [ 527.713085][ T8707] usb 5-1: device descriptor read/8, error -71 [ 527.833484][ T8707] usb usb5-port1: unable to enumerate USB device 18:26:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="5001000010000307ebfff40606c6000040041200", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010000000250012000800010076657468"], 0x200}}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a3e, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ptrace$setregs(0xd, r1, 0x2, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x5, 0xffffffffffffff00}, 0x4020, 0x0, 0x7, 0x5, 0x2, 0x7beb}, r1, 0x0, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000100000000000012"], 0x1}}, 0x0) r2 = socket(0xa, 0x2, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000980)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000680)=""/79, 0x4f}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/240, 0xf0}, {&(0x7f0000000900)=""/114, 0x72}], 0x5, &(0x7f0000000ac0)=""/143, 0x8f}, 0x140) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) 18:26:51 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x4, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:51 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() ptrace(0x10, r3) ptrace$peeksig(0x2, r3, &(0x7f0000000400), &(0x7f0000002000)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000080)={{0x8, 0x0, 0x6, 0x2, 'syz0\x00', 0x100}, 0x6, 0x10000000, 0x10000, r3, 0x2, 0xfffffffb, 'syz1\x00', &(0x7f0000000000)=['erspan0\x00', '\x00'], 0x9, [], [0x5, 0x2, 0x8, 0x586c]}) 18:26:51 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xb00, 0x0) 18:26:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) r0 = clone3(&(0x7f0000000280)={0x45040900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = getpid() ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ptrace(0x10, r1) ptrace$peeksig(0x2, r1, &(0x7f0000000400), &(0x7f0000002000)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000400)={0xffff0000, 0x8001, {r0}, {}, 0x0, 0x3}) clone3(&(0x7f0000000480)={0x101100, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000300), {0x22}, &(0x7f0000000340)=""/123, 0x7b, &(0x7f00000003c0)=""/14, &(0x7f0000000440)=[r1, r2], 0x2}, 0x58) sendmsg$RDMA_NLDEV_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="20000000011ceb012dbd7003fcdbdf2508000100000000000800010002000000dde6a3588fd2a51961493b8e8c6ede34c32519a3ddd493a6c4b636124fd38ab8acc0948179d2b5fc3a18d0b828d3d3975d5ad9e9f9b121979a1d3c901154800473f96b32b1c65128e7a7ad26c90dfd7bfe818e65b61b229cac375b55aabf717227770c0fd30201fe0144c7bebed3bf5b0ff530874af2631047414ba4238f1659ba413d2caaf5262a4b04921b5d066ec20b39656430cd5a964c82f83be1dc82094fd6afceed2268ec176caa34eda66e593a43cc617dcefa685c984e2b62125da59ea4bab2714011a82b3b3b71621c89501f6fd50834639463ad8ef725"], 0x20}, 0x1, 0x0, 0x0, 0x4001}, 0x4000040) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000040)='\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0)=@ccm_128={{0x304}, "32a80c7039ea7aa3", "a50b48918390029260674e8a49976dfb", "a380a835", "03f13414544585d8"}, 0x28) [ 528.092538][T10907] IPVS: ftp: loaded support on port[0] = 21 18:26:51 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xc00, 0x0) 18:26:51 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') socketpair(0xbe7c0f2578fc0632, 0x2, 0x3, &(0x7f00000000c0)={0xffffffffffffffff}) syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:51 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x5, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 528.414444][T10914] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 528.426890][T10914] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. [ 528.919238][T10925] IPVS: ftp: loaded support on port[0] = 21 [ 529.057109][T10914] team0: Port device veth11 added 18:26:52 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000000)=0x38000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0xc0000000, @private2, 0xbe}, @in={0x2, 0x4e24, @empty}}}, 0x118) [ 529.204593][T10914] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 529.219316][T10914] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. 18:26:52 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xd00, 0x0) 18:26:52 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x6, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 529.859843][T10914] team0: Port device veth13 added 18:26:53 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITHAW(r0, 0xc0045878) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000000)={'tunl0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) 18:26:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="5001000010000307ebfff40606c6000040041200", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010000000250012000800010076657468"], 0x200}}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a3e, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ptrace$setregs(0xd, r1, 0x2, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x5, 0xffffffffffffff00}, 0x4020, 0x0, 0x7, 0x5, 0x2, 0x7beb}, r1, 0x0, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000100000000000012"], 0x1}}, 0x0) r2 = socket(0xa, 0x2, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000980)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000680)=""/79, 0x4f}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/240, 0xf0}, {&(0x7f0000000900)=""/114, 0x72}], 0x5, &(0x7f0000000ac0)=""/143, 0x8f}, 0x140) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) 18:26:55 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x7, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:55 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xe00, 0x0) 18:26:55 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x400, 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) socketpair(0x5, 0x2, 0x4d735, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) [ 532.805711][T10962] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 532.817858][T10962] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. [ 533.437850][T10962] team0: Port device veth15 added 18:26:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setgroups(0x0, 0x0) 18:26:57 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x7, 0x4, 0x2, 0x15, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_sa={0x2, 0x1, 0x4d6, 0x20, 0x2, 0xd9, 0x3, 0x80000000}, @sadb_ident={0x2, 0xa, 0x3, 0x0, 0x3}, @sadb_key={0x3, 0x8, 0x68, 0x0, "2b2d186f0413f4dda30c10e406"}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_x_filter={0x5, 0x1a, @in6=@loopback, @in=@multicast1, 0xa, 0x10}, @sadb_ident={0x2, 0xa}, @sadb_lifetime={0x4, 0x2, 0x80000000, 0x9, 0x38b052ff, 0x1}]}, 0xa8}}, 0x40000c4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) mq_notify(r0, &(0x7f0000000180)={0x0, 0x39, 0x2, @tid=0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) socket$pppl2tp(0x18, 0x1, 0x1) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000240)={0x20, 0xfffffffffffffffe, 0x0, {0x7ff, 0x4, 0x6}}, 0x20) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000280)) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0xfffffffffffffeff) socket$bt_hidp(0x1f, 0x3, 0x6) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000003c0)) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x500, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x1c}}, 0x20008090) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x48, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_STA_WME={0x34, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x8}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x2e}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x2}, @NL80211_STA_WME_UAPSD_QUEUES={0x5}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000640), 0x4) rt_sigaction(0x1c, &(0x7f0000000700)={&(0x7f0000000680)="f342a536656626640f01a4655b1125bff30f38f647d1e1fe66420f72e358c441365cc9f30fa7e0440f9d0f450f5e44c3d66436f20f1bc3", 0x10000000, &(0x7f00000006c0)="6541db6a00aac4c141f51b0f381c05000000008f89d090610df30f1efe0f1c6d062e43d84302460fefeac441fff0610d", {[0x333]}}, &(0x7f00000007c0)={&(0x7f0000000740)="66430fc401002e672ef20f46c946d0fc664e0f38f5b700000020460fffe1c4c2d0f3cf66400f38333af3aff3470fa6d08f2810954d8f86", 0x0, &(0x7f0000000780)="2e0fa4e53c65f2ab650faf4500c4a1937df9c4a21d983921dff3420f7e0ec4c2790f600065d84c43012e40d37b00"}, 0x8, &(0x7f0000000800)) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x40, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9b64}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb1f}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x44004) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000940)) pipe2$9p(&(0x7f0000000980), 0x800) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000009c0)={0x5, 0x7, 0x9, 0x4}) 18:26:57 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xe03, 0x0) 18:26:57 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x8, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:57 executing program 1: getrlimit(0x3, &(0x7f0000000000)) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:26:57 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, 0x3, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0x8}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xfffffff9}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x3f}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0x20}, @CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x5}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x843}, @CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x75}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000804}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, [], 0xd}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x81) 18:26:58 executing program 1: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3fb, 0x8, 0x70bd2c, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000140)={0x7d3, 0x1f}) fcntl$setflags(r0, 0x2, 0x1) 18:26:58 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x201e}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000040)={@dev, 0x74, r5}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000480)={@dev, r5}, 0x14) dup2(r0, r3) 18:26:58 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x9, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:26:58 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xf03, 0x0) 18:26:58 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x28, 0x6, 0x0, @remote, @local, {[@hopopts={0x0, 0x0, [], [@generic={0x0, 0x3, "be6aab"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@sack={0x5, 0x2}]}}}}}}}}, 0x0) 18:26:58 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair(0x27, 0x80000, 0x2, &(0x7f0000000000)) 18:26:58 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xa, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 537.485970][T11039] IPVS: ftp: loaded support on port[0] = 21 [ 537.815912][T11039] chnl_net:caif_netlink_parms(): no params data found [ 537.948152][T11039] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.956418][T11039] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.966094][T11039] device bridge_slave_0 entered promiscuous mode [ 537.977807][T11039] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.985296][T11039] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.994738][T11039] device bridge_slave_1 entered promiscuous mode [ 538.031927][T11039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 538.054110][T11039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 538.093905][T11039] team0: Port device team_slave_0 added [ 538.105548][T11039] team0: Port device team_slave_1 added [ 538.136734][T11039] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 538.143941][T11039] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 538.170226][T11039] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 538.193212][T11039] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 538.200241][T11039] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 538.226972][T11039] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 538.271269][T11039] device hsr_slave_0 entered promiscuous mode [ 538.279119][T11039] device hsr_slave_1 entered promiscuous mode [ 538.288887][T11039] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 538.296734][T11039] Cannot create hsr debugfs directory [ 538.493787][T11039] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 538.522512][T11039] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 538.543937][T11039] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 538.564564][T11039] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 538.657549][T11039] bridge0: port 2(bridge_slave_1) entered blocking state [ 538.664753][T11039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 538.672719][T11039] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.679987][T11039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 538.793726][T11039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 538.820242][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 538.830826][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.844999][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.858127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 538.885786][T11039] 8021q: adding VLAN 0 to HW filter on device team0 [ 538.907171][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 538.917455][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 538.927287][ T9116] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.934633][ T9116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 538.963878][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 538.973804][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 538.983224][ T8707] bridge0: port 2(bridge_slave_1) entered blocking state [ 538.990592][ T8707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 538.999931][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 539.022075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 539.046628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 539.057888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 539.091726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 539.100968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 539.112541][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 539.123249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 539.133438][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 539.154975][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 539.164312][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 539.185187][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 539.224521][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 539.233292][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 539.263334][T11039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 539.300222][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 539.310751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 539.359658][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 539.368750][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.389269][T11039] device veth0_vlan entered promiscuous mode [ 539.401784][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.409709][ T5] Bluetooth: hci5: command 0x0409 tx timeout [ 539.411305][ T8707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 539.440521][T11039] device veth1_vlan entered promiscuous mode [ 539.500339][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 539.509816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 539.519593][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 539.529355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 539.548269][T11039] device veth0_macvtap entered promiscuous mode [ 539.568408][T11039] device veth1_macvtap entered promiscuous mode [ 539.607837][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 539.618435][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.628700][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 539.639483][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.649663][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 539.660287][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.670394][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 539.681079][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.691187][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 539.701811][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.715834][T11039] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 539.736757][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 539.746355][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 539.755954][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 539.765672][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 539.787839][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 539.798781][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.808932][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 539.819566][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.829612][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 539.840284][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.850572][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 539.861185][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.871267][T11039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 539.881873][T11039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 539.894954][T11039] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 539.904238][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 539.914533][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:27:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x75, 0x75, 0x5, [@volatile, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], "1d"}, @volatile, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x95}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 18:27:03 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1003, 0x0) 18:27:03 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xb, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x3, [@volatile, @volatile, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x5f}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 18:27:03 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000000)={0x4, 0x8}) 18:27:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcd, 0xcd, 0x4, [@datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], "1d"}, @union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0xec}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 18:27:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)) 18:27:04 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xc, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:04 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x8000000, 0x8, 0xfb, 0x0, 0x400000006, 0x1, 0x400000000000000]}) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800000000, 0x4a212, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x40, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x5e22, @local}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:27:04 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x5000f4) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x4) 18:27:04 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1020, 0x0) 18:27:04 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'tunl0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x39}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x31, 0x5, 0x7, "9f4bb3bf0d8dd0de88d34899b85702af", "c9365f0ae8f35a7084e501aa0f9a215db08ca92e21ead0bd5a12e3ae"}, 0x31, 0x0) 18:27:04 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1100, 0x0) 18:27:04 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xd, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 541.469741][ T9531] Bluetooth: hci5: command 0x041b tx timeout 18:27:04 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0xfffffd38}}, 0x0) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="ff000000000000001c0012000c000100626f6e6400"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0x800000000000000}, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000500)) 18:27:04 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000080)={0x9, 0x7f, [0x2, 0x7, 0x100, 0x8, 0x800]}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x3, 'veth0_vlan\x00', {0x7f}, 0x1}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) 18:27:05 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1103, 0x0) [ 542.030141][T11301] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 18:27:05 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xe, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:05 executing program 1: socketpair(0x1e, 0x2, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000540)=ANY=[@ANYBLOB="070f288b"]) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:27:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @private}, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, 0x0) 18:27:05 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1200, 0x0) 18:27:06 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001240)={r2, 0x0, 0x1000, 0x83, &(0x7f0000000080)="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", &(0x7f0000001080)=""/131, 0xad, 0x0, 0x16, 0xd7, &(0x7f0000000000)="30c867de94b322672403bb37f2ff32cec55e20bbcbd4", &(0x7f0000001140)="1b71e02a7293df3a58955e237c1bfaf9f89f86ef47e35f7969fa21cd8a5fbaea731ed17eddacf30eacdc364b090b459007bef4e7396be07f0f75a6a9649e927a48fa46d7dc43e66f923f1dfa3cbaa7835855014c86a50489ae40dbf99d2e9f70616b4c82a9dc5b1fc02a13c966abd5f3ddf8921cc9ffe88513345a50cbd25377e0350a843f9170e2f0ccc3444f05e29cc87dc067221ecc1bf6251a792567c4f6bb3ae1c08d6928acceab5e57ee31ed804d2f640c9feb2f592d3292a1e5e398515b89fdbeb3fb164eea72c67e02029bd1af76a2d5dba7d4"}, 0x40) 18:27:06 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1203, 0x0) [ 543.693913][ T5] Bluetooth: hci5: command 0x040f tx timeout [ 543.735978][T11303] device hsr_slave_1 left promiscuous mode [ 543.777425][T11301] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 18:27:07 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1d00, 0x0) 18:27:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0f0000000000000000000f00000008000300", @ANYRES32=r1, @ANYBLOB="05002e0001"], 0x24}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:27:07 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x10, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:27:07 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) 18:27:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x37cb1133) splice(r0, 0x0, r4, 0x0, 0x19404, 0x0) 18:27:07 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, 0x0) 18:27:07 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x11, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={0x0, 0x8000000, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0f0000000000000000000f00000008000300", @ANYRES32=r1, @ANYBLOB="05002e00010000"], 0x24}}, 0x0) 18:27:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x3) 18:27:07 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000000)={{0x5}, 0x7e}, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x110, 0x0, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xe4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xd1, 0x5, "379d3162f4a9374100f8b87e68a7f9f7c444845e5e578ad1895bdbc3aa43f29f403c5dbae85ef01202c9b461f560b53669ae4df8ce470ccfb0042a3a8bc1a3d1cf6c80856018790e4234ca68354ad55f0300320253ff829a42a0cc013b173268a48e772d77baa5f7996ef9e9f6e63e51cac64aea9d8f99d22d075fd91420762cd05155d9c5b35475718c3604f88fdf7511337e0f2c469419decb4e570f564b8a56d88eee0effba5786646e34ca0a312c0ef378409e2e26241119c15990146fecf055850952b85e32a7a8e9f482"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x7}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x24002800}, 0xc0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:08 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffffffffffffd]}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0x3f, &(0x7f0000000080)=0x0) io_submit(r5, 0x0, 0x0) io_submit(r5, 0x2, &(0x7f0000000000)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, 0x0]) 18:27:08 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2010, 0x0) 18:27:08 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x12, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 18:27:08 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) r2 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r2, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000080)) 18:27:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000340)=0x205, 0x4) r1 = dup2(r0, r0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) clock_gettime(0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) sendto$inet(r1, 0x0, 0x0, 0x2401c6ea, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0xcd398530) [ 545.385673][T11400] mmap: syz-executor.3 (11400) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 18:27:08 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000080)={@random="2b0fc2b78970", @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, "0f9f5a"}}}}}}, 0x0) 18:27:08 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x25, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:08 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2500, 0x0) 18:27:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x8) [ 545.717214][ T5] Bluetooth: hci5: command 0x0419 tx timeout 18:27:09 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x5c, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:09 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) signalfd4(r0, &(0x7f0000000000)={[0x7]}, 0x8, 0x80800) syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x210100) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x8, @loopback, 0x1}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x80000001, @ipv4={[], [], @local}, 0x5}, @in6={0xa, 0x4e23, 0x3, @private2={0xfc, 0x2, [], 0x1}, 0xbf6}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x1000}], 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 18:27:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002340)="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", 0x805}], 0x1}}], 0x1, 0x48080) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:27:09 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2f00, 0x0) 18:27:09 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000200)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000240)={0x7f, 0x1}) 18:27:09 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x300, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:09 executing program 1: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001200)={0xffffffffffffffff, &(0x7f0000000100)="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", &(0x7f0000001100)=""/226}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 18:27:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000340)=0x205, 0x4) r1 = dup2(r0, r0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) clock_gettime(0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) sendto$inet(r1, 0x0, 0x0, 0x2401c6ea, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0xcd398530) 18:27:09 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x3f00, 0x0) 18:27:10 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000200)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000240)={0x7f, 0x1, 0x1}) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x0, 0x1, 0x1}) 18:27:10 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x500, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:10 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010002000000407d1e5a2d40000000000109022400010000200009040000010301e60009210000000122010009058103"], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000380)={0x24, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="002201"], 0x0}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$SNDCTL_SYNTH_ID(r3, 0xc08c5114, &(0x7f0000000080)={"fe5e9d8fbb50b1dd118273f0ed1c85677e67e70c66b60936643ee41cf3a7", 0x373, 0x2, 0x401, 0xffffffff, 0x5, 0x5, 0x1000, 0x2, [0x1, 0x2, 0x5, 0xb3, 0x81, 0x2c, 0x1, 0x3f, 0x109eeda7, 0xed, 0xb76, 0x0, 0xe7, 0xd766, 0x4, 0x4, 0x3, 0x80000001, 0x80]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'syztnl0\x00', 0x0}) 18:27:10 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x4000, 0x0) 18:27:10 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x600, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 547.657753][ T5] usb 2-1: new high-speed USB device number 2 using dummy_hcd 18:27:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 18:27:11 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x700, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000340)=0x205, 0x4) r1 = dup2(r0, r0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) clock_gettime(0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) sendto$inet(r1, 0x0, 0x0, 0x2401c6ea, &(0x7f00000008c0)={0x2, 0x4e23, @empty}, 0x10) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0xcd398530) [ 548.066334][ T5] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 548.078038][ T5] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 548.088257][ T5] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.40 [ 548.097686][ T5] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 548.272813][ T5] usb 2-1: config 0 descriptor?? 18:27:11 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x900, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 548.766789][ T5] savu 0003:1E7D:2D5A.0001: unknown main item tag 0x0 18:27:11 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xa00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 548.847773][ T5] savu 0003:1E7D:2D5A.0001: hidraw0: USB HID v0.00 Device [HID 1e7d:2d5a] on usb-dummy_hcd.1-1/input0 18:27:12 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x4800, 0x0) [ 548.976051][ T5] usb 2-1: USB disconnect, device number 2 18:27:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1fff03000000000000503a831c574d973b9355a89161bc689c49bf88750037dd8896b6fe13091552553470e0aa1d18d3bf787e1064e39394d5e769a750ecc6a6fdac4d9bd0bfcb32266f571166f560e2b163f65cf9b286fa104e56b7c147bf9968318a3e0ba6512de0d5bbe3cc7eda35c3d926209bbef9fb62315ebc474efacc9e8262c8b5c81fd637c62ae4996cf263cef0f69451ee8f33d2baba", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:27:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x400, 0x1, 0x0) [ 549.783842][ T9531] usb 2-1: new high-speed USB device number 3 using dummy_hcd 18:27:13 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000000), 0x4) 18:27:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), &(0x7f0000000080)=0xc) 18:27:13 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xb00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:13 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 18:27:13 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x4c00, 0x0) 18:27:13 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xc00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:13 executing program 5: socket(0x1c, 0x3, 0x0) syz_emit_ethernet(0x52, &(0x7f00000005c0)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 18:27:13 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x5c00, 0x0) 18:27:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f00000002c0)={r1}, 0x8) 18:27:13 executing program 1: keyctl$read(0xb, 0x0, &(0x7f0000000040)=""/21, 0x15) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)="04918a2ab9db127918da91b8911420337c30ba57e15c52a31455e083831793dd775fbc31ece7aa506e1402e975afb5cc9d4129e9c9ae9f1e5cda827fee99959919809c7f1d7405a7798194836c3d1fc1cd22bab065e2943066bf947783a0", 0x5e) socketpair(0x1e, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/arp\x00') ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000140)={0x7e0, "1ec0dd1c9da355e4f318b18560207b32ec368c98ec4439e6349c8b6568799327", 0x2, 0x6, 0x5, 0x4, 0x40000, 0x2}) 18:27:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="2400000001010102"], 0x24}}, 0x0) 18:27:15 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xd00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:15 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x6580, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x1, 0x0, @pic={0x1f, 0x1, 0x3f, 0x9, 0x1, 0x20, 0x52, 0xab, 0x5, 0x7, 0x8, 0x40, 0x2, 0x2c, 0x7, 0x40}}) signalfd4(r0, &(0x7f0000000080)={[0x3]}, 0x8, 0x800) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002840)={'gretap0\x00', 0x0}) 18:27:15 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)=')', 0x1, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:27:15 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x6800, 0x0) 18:27:15 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) sendto(r0, 0x0, 0x0, 0x20184, 0x0, 0x0) 18:27:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x6c00, 0x0) [ 552.919908][T11578] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 18:27:16 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0xe00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xd) sendto$inet6(r0, &(0x7f0000000040)='\x00', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) listen(r0, 0x283) accept4(r0, 0x0, 0x0, 0x0) 18:27:16 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'gretap0\x00', 0x0}) 18:27:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0xff19, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a83587cff000100e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 18:27:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="2400000001010102"], 0x24}}, 0x0) 18:27:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x7400, 0x0) 18:27:16 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x1100, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:16 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f6, 0x400, 0x70bd2b, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x20000040) [ 553.675767][T11600] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 18:27:17 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x1200, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x7a00, 0x0) 18:27:17 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2500, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:17 executing program 1: socketpair(0x21, 0x80f, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000006061ae6e00143300fc02000000000000000000003667c60873"], 0x46) 18:27:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001780)={0x14, 0x1, 0x8, 0x301}, 0x14}}, 0x0) 18:27:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xec00, 0x0) 18:27:17 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x10010000004e20}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8880fe800001000000003f00000000000600ff02000000000000000000000000000101004e20004590"], 0x0) 18:27:17 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x5c00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:18 executing program 1: socketpair(0x2c, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:18 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xedc0, 0x0) 18:27:18 executing program 5: 18:27:18 executing program 4: 18:27:18 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xee00, 0x0) 18:27:18 executing program 1: socketpair(0x1e, 0xa, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:18 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:18 executing program 3: 18:27:18 executing program 4: 18:27:18 executing program 5: 18:27:18 executing program 1: socketpair(0x22, 0x4, 0xfffffe, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:19 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xef00, 0x0) 18:27:19 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x2, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:19 executing program 5: 18:27:19 executing program 4: 18:27:19 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x4140, 0x0) 18:27:19 executing program 3: 18:27:19 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xf000, 0x0) 18:27:19 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x3, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:19 executing program 5: 18:27:19 executing program 4: 18:27:20 executing program 3: 18:27:20 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x10100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000000)={'syztnl2\x00', 0x0}) 18:27:20 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xf100, 0x0) 18:27:20 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x4, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:20 executing program 5: 18:27:20 executing program 4: 18:27:20 executing program 3: 18:27:20 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x5, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:20 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000001380)='veth1_to_batadv\x00') ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0xa00) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001300)={&(0x7f0000002880)={0x1570, 0x15, 0x400, 0x70bd2d, 0x25dfdbfb, {0x8, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x6e, 0x1, "3ecdfe020a8e363ef3546e878632c60c7570cc9d8e2344d5343b17bb33a28cbc9f55f759e3c1b085d07a8f062c5b906df80e7925bcdd1aa301562f3ad6e6627dc529a4f5fe898e4d5a81120acc288467e511903e2a9272f890abf28421a97d0ad2d23284b98112438c2f"}, @INET_DIAG_REQ_BYTECODE={0xe6, 0x1, "9f066a51f77aae14910e2e5599786b0bddc76fd5779eec9b86951230235861e839e986f0c73a8647d01c0679506dab9a475aea97bbaa5337d75210a4d8fcde71be448d9f30a454a67a92ef95ecbe0b3904f7adcf865f2d348b93005edfc4864239385956ee1d34349e360ce20e7d3b5b30f8db190f1311feaaf1e8ff90fe0961c5437ccf45d7248ce723c3e2fb219ab21bf18d41c8436c55246a0ec59ea51d7844599e688b91d2a6fdae80b198ed9d863d2f1e65b10c9076056651e6741a653c62ad0aaa815a11798439bc27ca78362d78b98dfa282d700ac4196d064771688f1781"}, @INET_DIAG_REQ_BYTECODE={0x12, 0x1, "6acd739f60244ecaa1976f49da54"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e0f0c87a2283cd24f0fbf4a30b864978a3b7292637fb42e2e2ef83e7212b99f8e4f158257321a4ea71c0663cbe98cc1c4495087c004c5b61143cebbffbee87f01a621e8c62c88358ab276580f9f8d7a92e0ad85ff25350babb14fa526b8abde56d5297dc3f3065a3fe263f778362"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x3b, 0x1, "9405793dbd2f1ebf970f85ba4fe9557471ed25c4122252a2fd5809f28675c1d516b32725fd34e9ebc6bd7e59fd0f7d505a40ba40c490d7"}, @INET_DIAG_REQ_BYTECODE={0x4d, 0x1, "e88e176c6d832f83ac76c379c46471e7adb61bcc03f12e01e9719959bd7d122ed21efbebfba518308b745b42e8805194ad5ac2ffcf4a9a1a1fc406dac5ef9aa14a74015712fe0ceb1b"}, @INET_DIAG_REQ_BYTECODE={0xd9, 0x1, "45cf38f11e0600000000063e3d36a8f6654a09c346080cadada64eede79069a4c4ada6a0ae681216afdbdbf96ceed1d04ff04a3d4bea64a59d9ee4e6bf42eb15d0c7e5df891c0e9739a5e2755ed6bba024f84b3e229a9ee4440e6b20013d477ae265caa3795c49efbd1cb1ef604b4bd61629e43d036ce509c9349a687c0239d837fb4a2b2a85a2db7a1b54b72bfa99fa06eea6f7ad930500004fb6140ef0eb7086256684cd73bee5572dab9f54be6071d748f078a2305dcc8c90c7d58e7a3f71a3d5992f229a85e3dc78f9179f08d8a17df19c0000"}, @INET_DIAG_REQ_BYTECODE={0x9f, 0x1, "101f10163f2f2a1e65adc946bc3f8f9d225f7b21674f6484cefdbaf2bac04b3760ae53c16a665d1bda79a8187628a75eabe2097724c0c44b087eaf56d67e53fadd3ae621be2e738fc263f427e0302bf3f1273d8799e00b4715ddd4af176f6ff27b35e01e1528e495574b417987472ffed0682e38ba581ac49bab80be5d8c82d22714dca1732c2ab711c201c9cbbb3f1567810d02df6e54edb8543e"}, @INET_DIAG_REQ_BYTECODE={0xbb, 0x1, "940a06fe1e862e398193d547799b866b40e3a0f02c8d1b290bec145e71c7e877ef252ec263d80bff83cc4670c36a7f45420c52671399ae1c1e31455a111df0cda70c9b935e6c89b2bb9041dd5fff15a413283f30931ec13299afc1873e84091bf0fac056a6c287a3419f4e24983c3465f0c6f2072758c28c42f7209c0841e762fa75dd0bd14b16ceb78bd25e28437bbb0c25173a2ecbce028730c3e57a1ad6609553a3d1e23dd77adb9dab42d2246b2a68ae4163a7aec4"}, @INET_DIAG_REQ_BYTECODE={0xb4, 0x1, "7ac60d10ec43615fd0a6e85f52d6072a6e7bde965e53b8bb3dc6da2683334dd6b430dc6f84d53ff995506c9210cbc720d38adfd4c182f06113bb20b587af6f6b6aa7277e30e8ddd8db42be89a42fa7c937a3b85d31a9ebe4dec8194f515abb2702b79502798882668b63d7ca2fe55f9d9362875c333399e364155279653211133cc6c834ff28045773e4faf7355a29971489d5d6714135fbdb6ec38af38c8b098985b77f737db0189f7560cec9515f0d"}]}, 0x1570}, 0x1, 0x0, 0x0, 0x4800}, 0x4048810) 18:27:20 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xff03, 0x0) 18:27:20 executing program 5: 18:27:20 executing program 4: 18:27:21 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x6, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:21 executing program 3: 18:27:21 executing program 5: 18:27:21 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x40000, 0x0) 18:27:21 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000016680)=ANY=[@ANYBLOB="3d0d00000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4b9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/81354]) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:21 executing program 4: 18:27:21 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x7, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:21 executing program 3: 18:27:21 executing program 5: 18:27:21 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x44000, 0x0) 18:27:21 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0xc0, &(0x7f0000000080)=0xa2b6, 0x0, 0x4) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1800) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e0010000", @ANYRES16=0x0, @ANYBLOB="10002dbd7000fddbdf2506000000080001007063690011000200303030303a30303a31302e300000000008000300000000000600040003000000080001007063690011000200303030303a30303a31302e3000000000080003000100000006000400010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300030000000600040001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000006000400020000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000006000400010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300030000000600040000000000080001007063690011000200303030303a30303a31302e3000000000080003000300000006000400000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000006000400020000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300020000000600040002000000080001007063690011000200303030303a30303a31302e300000000008000300000000000600040002000000a97ea259566ec1b6c61a858ebe62ca83cc93fc8037632b9a85806916a4c0e24ddcef7d3a5104eacb6670628bfabd9d51157d77e4ecdcd583a7a6d450d619442ecdaf974db9a4915f5ca8ccc003fcf7a3345287c0926e29bc0a36b04f62ec8ad689eeefb2e61e0d387d29ac849970201ebe205338f59740918900dffdab4c7fcf6b4acc"], 0x1e0}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000380)={'veth1_to_hsr\x00', {0x2, 0x4e22, @multicast2}}) 18:27:21 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x8, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:21 executing program 4: 18:27:22 executing program 5: 18:27:22 executing program 3: 18:27:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xeddc0, 0x0) 18:27:22 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f0000000000)={0x2, 0x100, 0x7fe000, 0xf7, 0x7fffffff, 0x0, 0x7, 0x7fffffff, 0xad3, 0x4, 0x4, 0x0, 0xffff, 0x8}) 18:27:22 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x9, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:22 executing program 4: 18:27:22 executing program 5: [ 559.386733][ T9531] Bluetooth: hci0: command 0x0406 tx timeout 18:27:22 executing program 3: 18:27:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1fffff, 0x0) 18:27:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x458cc0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0x7f}, {0x45, 0x1f}, 0x20, 0x4, 0x9}) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x81}, 0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:23 executing program 4: 18:27:23 executing program 5: 18:27:23 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xa, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:23 executing program 3: 18:27:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x400000, 0x0) 18:27:23 executing program 5: 18:27:23 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_macvtap\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x84) socketpair(0x23, 0xc, 0xfffffffb, &(0x7f0000000180)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = syz_io_uring_complete(0x0) ioctl$KVM_NMI(r1, 0xae9a) 18:27:23 executing program 4: 18:27:23 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xb, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:23 executing program 3: 18:27:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x400400, 0x0) 18:27:23 executing program 5: 18:27:24 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xc, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:24 executing program 1: socketpair(0x1e, 0x2, 0x1000003, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:24 executing program 4: 18:27:24 executing program 3: 18:27:24 executing program 5: 18:27:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1000000, 0x0) 18:27:24 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$rxrpc(r2, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0x4a0a, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}, 0x24) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000080)=0x1ff) 18:27:24 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xd, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:24 executing program 3: 18:27:24 executing program 4: 18:27:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000000, 0x0) 18:27:24 executing program 5: 18:27:25 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xe, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:25 executing program 1: r0 = socket$inet(0x2, 0x6, 0x1ff) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000012c0), &(0x7f0000001300)=0xe) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r1, 0x29, 0x37, &(0x7f00000000c0)={0x32, 0x7, [], [@enc_lim={0x4, 0x1, 0x80}, @ra={0x5, 0x2, 0x8}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x400, [0xab1, 0x3ff, 0xcd]}}, @pad1, @jumbo={0xc2, 0x4, 0x7e9}, @pad1, @pad1]}, 0x40) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:25 executing program 3: 18:27:25 executing program 4: 18:27:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x3000000, 0x0) 18:27:25 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x10, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:25 executing program 5: 18:27:25 executing program 3: 18:27:25 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f00000000c0)={0x53a, 0x9, 0x1, 0x48c, 0x1, [0x5, 0x6, 0x7f, 0x3], [0x3cb3, 0x9, 0x5, 0xfffffff8], [0x0, 0x4, 0x1], [0x4, 0x3c65aab2, 0x0, 0x4]}) socketpair(0x8, 0x1, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000140)={0xffffffffffffffff, 0x401, 0x1ff, 0x1}) ioctl$SNDCTL_SEQ_OUTOFBAND(r2, 0x40085112, &(0x7f0000000180)=@n={0x0, 0x0, @SEQ_NOTEON=@special}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000000)={{0x8, 0x4}, 0x10}, 0x10) 18:27:25 executing program 4: 18:27:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x4000000, 0x0) 18:27:26 executing program 5: 18:27:26 executing program 1: socketpair(0x23, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x0, 0x5, 0x2, 0x7, 0x5, 0x9, 0x1ff, 0x6, r2}, &(0x7f0000000240)=0x20) fstat(r1, &(0x7f0000000080)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') accept$phonet_pipe(r3, &(0x7f0000000100), &(0x7f0000000140)=0x10) 18:27:26 executing program 3: 18:27:26 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x11, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:26 executing program 4: 18:27:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x5000000, 0x0) 18:27:26 executing program 3: 18:27:26 executing program 5: 18:27:26 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000000)={r2}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:26 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x12, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:26 executing program 4: 18:27:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x6000000, 0x0) 18:27:27 executing program 1: socketpair(0x2a, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0xffffffffffff819a]}, 0x8) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000000c0)={0x354, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_IE={0x32c, 0x2a, "eea3c8bf9593483d510a94e51083efcf531d5115558912a208535ae1b78d627766c5762c88d04b94b07ade01d18d9f5dcf60bf98f32c592d6f3dafb0190f07d112d6d5306fde84bc18d8b332d046aecfe926f2a419a03fb34ccf3c4a881d5e8f03781d219ff828f8d4452fb1da93fef0708feb8101ad18f6ac3e194b3983c11c32a23ea64cf1e7298dfc30bed5892b459144cebd6c40710cf9b4078a23a524e74e9e66c625f9085ea8191de5d7bed2b842d10e208a2d74cf3370862817769ed66357279de723bf379fa0a7af21f96f3d23b5104f3aad9c5262443da790761fe288648154daccf58164c7b231e5ba835bf75d6d3d801f449eb09406134be1590bbea5b153bbf694b70b3f3149758070e51cdc56dc931579517a1b9c40888b90f92acf335b949ca5e5119c376b0431163b84c5b024c8a2670eaf355824f462695f8e99868e518912f3daf9bc3f579b67f13c3741ce21fe5a2c412706f3e2a4cf9500cef253850657465d8455fcf4f0240a5435bb393e0fb7f1157cebaa5fa58618c09187782d94042e1d5a8a054edaa60f10e4c2f23cf555cd12a721f325b1f746c7527dfa689615b52f049e21fd8c7f245e867e0b2009b3c5683a96fbd493b3313b3ef811aa1002bded48ace17860dfb5a1b6dceea459277d7af0992960abf30493062575c9a5e01537285ec3dce2447f2fd12885b416540d9a55e8c5b2b68e4b083832da00b76325aa449ea9d75abe329ff2b55e4d78fde3e2188eb4a0700993cf4203242d5e60578414a03371f4483afa924ca9be7f7672a0ad7b40e7cba04f36ae6686a06c3076a3e7fc2fc0685908af3c89bbd31a6cdd5429bdf6749328569505f7d6626a3bab37d50d1677d17423b352e448dd98a85f99b8660c8a56678acfca62440a8aa4686bf37ebd38fe03567980297aa586c1746bcd0ba41556abb8e6e51432d1c0b26da6c6daf13ad380e06cbaf6969aa74a62856b4e273f5c1c839c7ca71e034802880b97eb718fd38323c026bff9bfc206affb0693e664397d1158df5d29df8c82b47aaaae6fb38bf0844861c392b53ab2daca3eb2816901ca931d95984d7fbd74fc26b73abf84856ed01d1659bd0874869796316cb5207531218ac6909c820db09d"}, @NL80211_ATTR_HIDDEN_SSID={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x200}}]}, 0x354}, 0x1, 0x0, 0x0, 0xa101}, 0x4) 18:27:27 executing program 3: 18:27:27 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x25, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:27 executing program 5: 18:27:27 executing program 4: 18:27:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(0xffffffffffffffff, 0xc0984124, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000000)={0x3c, @broadcast, 0xce23, 0x4, 'lblcr\x00', 0x1e, 0x4, 0x3f}, 0x2c) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x7, 0x2, {{0x7, '-+-\x1a!!\''}, 0xff}}, 0x14) 18:27:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x7000000, 0x0) 18:27:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x13, &(0x7f0000000180)=0x2000000, 0x4) 18:27:27 executing program 4: r0 = socket(0x2, 0x3, 0xff) recvmmsg(r0, 0x0, 0x0, 0x2020, 0x0) 18:27:27 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x5c, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:27 executing program 5: 18:27:28 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x20, 0x0, 0x9, 0x7ff, {{0x5, 0x4, 0x0, 0x24, 0x14, 0x67, 0x0, 0x1, 0x4, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0xe}}}}}) 18:27:28 executing program 3: 18:27:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x8000000, 0x0) 18:27:28 executing program 4: 18:27:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x300, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:28 executing program 5: 18:27:28 executing program 1: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:28 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, 0x0, &(0x7f0000000040)) 18:27:28 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0xc0045401, &(0x7f00000000c0)) 18:27:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x9000000, 0x0) 18:27:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, 0x0, 0x11}, 0x40) 18:27:28 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x500, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x5500) sendmsg$nl_xfrm(r4, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=@delpolicy={0x190, 0x14, 0x300, 0x70bd2b, 0x25dfdbfc, {{@in=@multicast2, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x4e24, 0xa576, 0x4e24, 0x1, 0x2, 0x0, 0x0, 0x33, 0x0, r5}, 0x6e6bb5, 0x2}, [@tmpl={0x104, 0x5, [{{@in6=@dev={0xfe, 0x80, [], 0x16}, 0x4d2, 0x3c}, 0x2, @in6=@rand_addr=' \x01\x00', 0x0, 0x1, 0x0, 0x3, 0x3, 0x2}, {{@in=@remote, 0x4d2, 0x3c}, 0x2, @in=@rand_addr=0x64010102, 0x3500, 0x0, 0x2, 0x0, 0x8, 0x400, 0x20}, {{@in6=@rand_addr=' \x01\x00', 0x4d5, 0x2b}, 0x2, @in6=@empty, 0x3501, 0x1, 0x0, 0x20, 0xffffffff, 0x1, 0x3ff}, {{@in6=@dev={0xfe, 0x80, [], 0x16}, 0x4d5, 0xff}, 0x2, @in=@loopback, 0x0, 0x1, 0x3, 0x1f, 0x5, 0x1, 0x4}]}, @replay_thresh={0x8, 0xb, 0x2}, @extra_flags={0x8, 0x18, 0x1}, @user_kmaddress={0x2c, 0x13, {@in6=@empty, @in6=@empty, 0x0, 0x2}}]}, 0x190}, 0x1, 0x0, 0x0, 0x40005}, 0x200400c2) ioctl$KVM_SMI(r2, 0xaeb7) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000002840)={'syztnl2\x00', 0x0}) 18:27:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x17, &(0x7f0000000080)=[@in={0x2, 0x2}], 0x10) 18:27:29 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xa000000, 0x0) 18:27:29 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x600, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x4, 0x0, @remote}], 0x10) 18:27:29 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 18:27:29 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0xfffffffd, 0x4) 18:27:29 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xb000000, 0x0) 18:27:29 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) 18:27:29 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x700, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:29 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x4, 0x0, &(0x7f0000000040)) 18:27:29 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) bpf$ITER_CREATE(0x4, &(0x7f00000000c0), 0x68) 18:27:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 18:27:30 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xc000000, 0x0) 18:27:30 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x900, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:30 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x400000000000, 0xa282) write$vhost_msg_v2(r0, 0x0, 0x0) 18:27:30 executing program 1: socketpair(0x3, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) kexec_load(0x5, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="153c766e98939d1fd1da8ebfef97595cab958cb2da8cfe59a9b94448bd4a04d36b2511841ac83b8f42e028e716e7c5dc7335d5ba8ea35d5a1ef1233ff79d7a333d1621a0b8d13e0b7f80e9f830e51b06af3f07bfb3da645cc2fc30b9cbcc59a8ad363971a057bb7ecc2a5c8fa922b510f2d0431dd0f28dc54ba0d98ee5cf", 0x7e, 0x4, 0x7fffffff}, {&(0x7f0000000100)="d57e9574b3bf37460ca0628776d30e33677cbb84446673ef6cba2c6677d4aa771e7e81ce543f1107e9ca408c62cf872f556dcad4ea5c6580771b28a93e3c162889336e858a024b4680d4741b246a30e0128a6959278f75f02368c2e98bf99bce8bf6200fab6b242d702b031258e05aafc125b8608998e75595268433fdf3e7851f8f605f9a341034075a9a1fbd677cb4fa13", 0x92, 0x6}, {&(0x7f00000001c0)="b2063afa550b75726461d54de025ec001963c154571c118f289c1b56d385ea8c4e221fcca9e5bb31d1391d64703301c12f3a97e3c2e9464d9ab987d59e233ec11f5cc0c8ff4ce20da6d7c38597560b60fdabd3cb06d253aafa0e3c3929045a9c5e7b3bdd897ffebfddb3f7d4d792908f18c11303b7b3d0e57698fca4c9743458a92b86d03059e06bcbdb8292549b7ceec82514587a3096cc1f87cf2dd6381d7b328e7cb4fba69a744f11483370ce", 0xae, 0x8, 0x100}, {&(0x7f0000000000)="1703a8149062e93c65ab638fd0dc", 0xe, 0x6, 0x3d}], 0xa0000) 18:27:30 executing program 5: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'batadv_slave_0\x00', @ifru_ivalue}) 18:27:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') ioctl$UDMABUF_CREATE(r0, 0x40305839, 0x0) 18:27:30 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xd000000, 0x0) 18:27:30 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xa00, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:31 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, 0x0, 0x1d) 18:27:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) 18:27:31 executing program 4: bpf$MAP_UPDATE_ELEM(0x5, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000080)}, 0x20) 18:27:31 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xe000000, 0x0) 18:27:31 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xb00, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:31 executing program 1: sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x1405, 0x20, 0x70bd2b, 0x25dfdbfc, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8}, {0x8, 0x3, 0xffffffff}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004800}, 0x1) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) 18:27:31 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x4400000000012, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0505609, &(0x7f0000000140)={0x0, 0xe}) 18:27:31 executing program 3: r0 = syz_io_uring_setup(0x136f, &(0x7f0000000180), &(0x7f0000f20000/0x3000)=nil, &(0x7f0000e14000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 18:27:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r1, r0}}, 0x18) 18:27:31 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xe030000, 0x0) 18:27:31 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xc00, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:32 executing program 3: r0 = socket(0xa, 0x2, 0x73) connect$unix(r0, &(0x7f0000000080)=@abs={0xa}, 0x6e) 18:27:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x18000, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x140a, 0x530, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x240440cd}, 0x48001) 18:27:32 executing program 5: r0 = syz_io_uring_setup(0x136f, &(0x7f0000000180), &(0x7f0000f20000/0x3000)=nil, &(0x7f0000e14000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000f21000/0x2000)=nil, 0x2000, 0x0, 0x153, r0, 0x0) 18:27:32 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xd00, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:32 executing program 4: unshare(0x28020680) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$netlink(r0, 0x0, &(0x7f0000000180)) 18:27:32 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xf030000, 0x0) 18:27:32 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 18:27:32 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 18:27:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002840)={'erspan0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) r4 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) recvmsg(r4, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) recvmsg(r4, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x2040) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000180)='veth1_to_team\x00') r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = fsmount(r1, 0x0, 0x8) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x412e80, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r7, 0xc0485661, &(0x7f0000000100)={0x1, 0x1, @stop_pts=0x1}) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r6, &(0x7f0000000000)={0x3}) sendmsg$nl_route(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000002}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="8100000059007f232a537000fddbdf250a0020002ca4979413981771864436f13199e377bfb2489b43524bf8c3174edd0b3a001d13361b83a861c19d33b845873625199ddec74bf9f9ec90af7d69f97a56ef299b8c4057506d0ef17040e7c670ee8712e81e5c5728ddaf329af0267daf081696b6675992decb9b901ca7438b3998703ea2001991c415d9580ec624c3d9f1c17ed436d6b3bec184047dcc06ff5a85", @ANYRES32=0x0, @ANYBLOB="03000000080002000000000008000200010000000800020006000000"], 0x34}, 0x1, 0x0, 0x0, 0x4100}, 0x4) read$alg(r5, &(0x7f0000000080)=""/8, 0x8) 18:27:32 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xe00, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:32 executing program 4: r0 = syz_io_uring_setup(0xc09, &(0x7f0000000000)={0x0, 0x6ed6}, &(0x7f0000fec000/0x1000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x0, 0x2011, r0, 0x10000000) 18:27:32 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x10000000, 0x0) 18:27:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000180)) 18:27:33 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x1100, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:33 executing program 5: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x3fe, 0x0}, 0x20) 18:27:33 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x10030000, 0x0) 18:27:33 executing program 4: clone3(&(0x7f0000000b40)={0x37a200080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:27:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00') 18:27:33 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x1200, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:33 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x11000000, 0x0) 18:27:34 executing program 1: r0 = socket(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8982, 0x0) 18:27:34 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8bf0, 0x0) 18:27:34 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0xe, &(0x7f0000000140)={0x0}, 0x10) 18:27:34 executing program 3: r0 = socket(0x10, 0x80002, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x5600, &(0x7f0000000140)={&(0x7f0000000100)=@getspdinfo={0x14, 0x28, 0x1, 0x0, 0x0, 0x9}, 0x14}}, 0x0) 18:27:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80284504, 0x0) 18:27:34 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x2500, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:34 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x11030000, 0x0) 18:27:34 executing program 4: r0 = gettid() r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 18:27:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000004c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 18:27:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x10, 0x0, 0x0) 18:27:35 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x5c00, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:35 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x12000000, 0x0) 18:27:35 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, &(0x7f0000000040)) 18:27:35 executing program 4: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x299fe794a3f5983c, 0xffffffffffffffff, 0x8000000) 18:27:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae68, &(0x7f00000000c0)={0x0, 0x0}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) 18:27:35 executing program 1: r0 = socket(0x2, 0xa, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 18:27:35 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x12030000, 0x0) 18:27:35 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) [ 572.313072][T12055] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 18:27:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 18:27:35 executing program 4: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x891e, &(0x7f0000000000)={'syz_tun\x00'}) 18:27:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000e80)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@NL80211_ATTR_WIPHY={0x8, 0x117}]}, 0x1c}}, 0x0) 18:27:35 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, 0x0) 18:27:36 executing program 5: r0 = socket(0x21, 0x80002, 0xa) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x110, 0x4, 0x0, 0x0) 18:27:36 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:36 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1d000000, 0x0) 18:27:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x32, &(0x7f0000000040), 0x3e) 18:27:36 executing program 4: shmctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) 18:27:36 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) 18:27:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000)=0xfffff1e4, 0x4) 18:27:36 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x3000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:36 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x20000000, 0x0) 18:27:36 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x17, 0x0, &(0x7f0000000040)) 18:27:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) 18:27:37 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc050565d, &(0x7f0000000140)={0x0, 0x9}) 18:27:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8929, &(0x7f00000002c0)={'ip6tnl0\x00', 0x0}) 18:27:37 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x4000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:37 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x20100000, 0x0) 18:27:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0xb, &(0x7f0000000180), 0x4) 18:27:37 executing program 4: prctl$PR_SET_TIMERSLACK(0x21, 0x0) 18:27:37 executing program 3: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000005, 0xffffffffffffffff) 18:27:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2203, &(0x7f0000000000)) 18:27:37 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x5000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:37 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x25000000, 0x0) 18:27:37 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_settings={0x0, 0x8, @fr=0x0}}) 18:27:37 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x0, 0xf96887abfdc27a61}, 0x10) [ 574.729220][ T9531] Bluetooth: hci1: command 0x0406 tx timeout 18:27:38 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x40, 0x0, &(0x7f0000000080)) 18:27:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4070aea0, 0x0) 18:27:38 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x6000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:38 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2f000000, 0x0) 18:27:38 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000005c0)={0x0, 0x8d4, 0x4, {0x1, @win={{}, 0x0, 0x401, 0x0, 0x0, 0x0}}}) 18:27:38 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, 0x0) 18:27:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x0, {0x0, 0x0, 0x80000000}}) 18:27:38 executing program 5: r0 = socket(0x2c, 0x3, 0x0) bind$vsock_stream(r0, 0x0, 0x0) 18:27:38 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x7000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:38 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x3f000000, 0x0) 18:27:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000000)=0x1000000, 0x8) 18:27:39 executing program 1: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) 18:27:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x2f, 0x0, 0x0) 18:27:39 executing program 5: r0 = socket(0xa, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x9) 18:27:39 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:39 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x40000000, 0x0) 18:27:39 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0x541b, 0x0) 18:27:39 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x63, 0x0, &(0x7f0000000000)) 18:27:39 executing program 3: r0 = socket(0xa, 0x3, 0x3) setsockopt$IPT_SO_SET_REPLACE(r0, 0x29, 0x12, 0x0, 0x0) 18:27:39 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x9000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:39 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x48000000, 0x0) 18:27:39 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x914, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x20) 18:27:40 executing program 4: rt_sigprocmask(0x1, &(0x7f0000002300), 0x0, 0x8) 18:27:40 executing program 1: bpf$PROG_LOAD(0x22, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 18:27:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) rseq(0x0, 0x0, 0x1, 0x0) 18:27:40 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xa000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:40 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x4c000000, 0x0) 18:27:40 executing program 4: socketpair(0x1e, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 18:27:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='schedstat\x00') read$FUSE(r0, 0x0, 0x0) 18:27:40 executing program 5: setreuid(0xee01, 0x0) r0 = getuid() setreuid(0xee01, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa}, 0x40) 18:27:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x0, 0x0) r1 = fsopen(&(0x7f0000000400)='ocfs2\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000480)='\x00', &(0x7f00000004c0)='./file0\x00', r0) 18:27:40 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xb000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:40 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x5c000000, 0x0) 18:27:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x15, &(0x7f0000000040), 0x3e) 18:27:41 executing program 5: r0 = syz_io_uring_setup(0x136f, &(0x7f0000000180), &(0x7f0000f20000/0x3000)=nil, &(0x7f0000e14000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x5, 0x0, 0x1) 18:27:41 executing program 4: r0 = io_uring_setup(0x4a3a, &(0x7f0000000000)) mmap$IORING_OFF_SQES(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x0, 0x43134f2e24a8f353, r0, 0x10000000) 18:27:41 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, 0x113, r0, 0x0) 18:27:41 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xc000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:41 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x68000000, 0x0) 18:27:41 executing program 5: ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0x125d) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) socket$tipc(0x1e, 0x2, 0x0) 18:27:41 executing program 1: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r1, &(0x7f0000000380)={0x23, 0x75, 0x0, {0x18, "f5d6f5ce7c6ae4c164dd1a790877fa31866afd695fdae0c0"}}, 0x23) read$proc_mixer(r0, &(0x7f0000000100)=""/34, 0x22) 18:27:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 18:27:41 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xd000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @broadcast}}}}) 18:27:42 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5411, &(0x7f0000000040)={'team0\x00'}) 18:27:42 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x4400000000012, 0x2) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x20000004}) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0505609, &(0x7f0000000140)={0x0, 0xe}) 18:27:42 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x6c000000, 0x0) [ 579.159314][T12242] ===================================================== [ 579.166326][T12242] BUG: KMSAN: kernel-infoleak in kmsan_copy_to_user+0x81/0x90 [ 579.173819][T12242] CPU: 0 PID: 12242 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 579.182550][T12242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.192619][T12242] Call Trace: [ 579.195934][T12242] dump_stack+0x21c/0x280 [ 579.200282][T12242] kmsan_report+0xf7/0x1e0 [ 579.204718][T12242] kmsan_internal_check_memory+0x238/0x3d0 [ 579.210540][T12242] ? should_fail+0x72/0x9e0 [ 579.215059][T12242] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 579.221235][T12242] kmsan_copy_to_user+0x81/0x90 [ 579.226100][T12242] _copy_to_user+0x1d2/0x2b0 [ 579.230773][T12242] video_usercopy+0x24a9/0x3140 [ 579.235683][T12242] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 579.241757][T12242] ? do_vfs_ioctl+0x1248/0x37d0 [ 579.246620][T12242] video_ioctl2+0x9f/0xb0 [ 579.250962][T12242] ? video_usercopy+0x3140/0x3140 [ 579.255994][T12242] v4l2_ioctl+0x255/0x290 [ 579.260334][T12242] ? v4l2_poll+0x440/0x440 [ 579.264765][T12242] __se_sys_ioctl+0x319/0x4d0 [ 579.269462][T12242] __x64_sys_ioctl+0x4a/0x70 [ 579.274069][T12242] do_syscall_64+0xad/0x160 [ 579.278588][T12242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 579.284483][T12242] RIP: 0033:0x45d5b9 [ 579.288371][T12242] Code: Bad RIP value. [ 579.292443][T12242] RSP: 002b:00007f17048e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 579.300866][T12242] RAX: ffffffffffffffda RBX: 000000000001f600 RCX: 000000000045d5b9 [ 579.308853][T12242] RDX: 0000000020000140 RSI: 00000000c0505609 RDI: 0000000000000003 [ 579.316838][T12242] RBP: 000000000118cf80 R08: 0000000000000000 R09: 0000000000000000 [ 579.324819][T12242] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c [ 579.332784][T12242] R13: 000000000169fb6f R14: 00007f17048e69c0 R15: 000000000118cf4c [ 579.340752][T12242] [ 579.343069][T12242] Local variable ----vb32.i@video_usercopy created at: [ 579.349929][T12242] video_usercopy+0x20d7/0x3140 [ 579.354775][T12242] video_usercopy+0x20d7/0x3140 [ 579.359613][T12242] [ 579.361935][T12242] Bytes 52-55 of 80 are uninitialized [ 579.367295][T12242] Memory access of size 80 starts at ffff888102dcfce0 [ 579.374041][T12242] Data copied to user address 0000000020000140 [ 579.380179][T12242] ===================================================== [ 579.387098][T12242] Disabling lock debugging due to kernel taint [ 579.393238][T12242] Kernel panic - not syncing: panic_on_warn set ... [ 579.399821][T12242] CPU: 0 PID: 12242 Comm: syz-executor.5 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 579.409864][T12242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.419906][T12242] Call Trace: [ 579.423196][T12242] dump_stack+0x21c/0x280 [ 579.427589][T12242] panic+0x4d7/0xef7 [ 579.431490][T12242] ? add_taint+0x17c/0x210 [ 579.435904][T12242] kmsan_report+0x1df/0x1e0 [ 579.440422][T12242] kmsan_internal_check_memory+0x238/0x3d0 [ 579.446220][T12242] ? should_fail+0x72/0x9e0 [ 579.450731][T12242] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 579.456882][T12242] kmsan_copy_to_user+0x81/0x90 [ 579.461729][T12242] _copy_to_user+0x1d2/0x2b0 [ 579.466320][T12242] video_usercopy+0x24a9/0x3140 [ 579.471212][T12242] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 579.477268][T12242] ? do_vfs_ioctl+0x1248/0x37d0 [ 579.482113][T12242] video_ioctl2+0x9f/0xb0 [ 579.486456][T12242] ? video_usercopy+0x3140/0x3140 [ 579.491471][T12242] v4l2_ioctl+0x255/0x290 [ 579.495796][T12242] ? v4l2_poll+0x440/0x440 [ 579.500199][T12242] __se_sys_ioctl+0x319/0x4d0 [ 579.504874][T12242] __x64_sys_ioctl+0x4a/0x70 [ 579.509557][T12242] do_syscall_64+0xad/0x160 [ 579.514076][T12242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 579.519978][T12242] RIP: 0033:0x45d5b9 [ 579.523858][T12242] Code: Bad RIP value. [ 579.528532][T12242] RSP: 002b:00007f17048e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 579.536942][T12242] RAX: ffffffffffffffda RBX: 000000000001f600 RCX: 000000000045d5b9 [ 579.544925][T12242] RDX: 0000000020000140 RSI: 00000000c0505609 RDI: 0000000000000003 [ 579.552884][T12242] RBP: 000000000118cf80 R08: 0000000000000000 R09: 0000000000000000 [ 579.560853][T12242] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c [ 579.568827][T12242] R13: 000000000169fb6f R14: 00007f17048e69c0 R15: 000000000118cf4c [ 579.578200][T12242] Kernel Offset: disabled [ 579.582523][T12242] Rebooting in 86400 seconds..