Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.37' (ECDSA) to the list of known hosts. 2020/11/24 09:50:03 fuzzer started 2020/11/24 09:50:03 dialing manager at 10.128.0.105:45807 2020/11/24 09:50:08 syscalls: 209 2020/11/24 09:50:08 code coverage: enabled 2020/11/24 09:50:08 comparison tracing: enabled 2020/11/24 09:50:08 extra coverage: extra coverage is not supported by the kernel 2020/11/24 09:50:08 setuid sandbox: enabled 2020/11/24 09:50:08 namespace sandbox: enabled 2020/11/24 09:50:08 Android sandbox: /sys/fs/selinux/policy does not exist 2020/11/24 09:50:08 fault injection: enabled 2020/11/24 09:50:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/11/24 09:50:08 net packet injection: enabled 2020/11/24 09:50:08 net device setup: enabled 2020/11/24 09:50:08 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/11/24 09:50:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/11/24 09:50:08 USB emulation: /dev/raw-gadget does not exist 2020/11/24 09:50:08 hci packet injection: enabled 2020/11/24 09:50:08 wifi device emulation: enabled 09:50:08 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socketpair(0x8, 0xf, 0xffffffff, &(0x7f0000006f40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000006f80), &(0x7f0000006fc0)=0x14) socket$inet6(0xa, 0x1, 0x5) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000007000)=0x589, 0x4) 09:50:09 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "aa93a12e4f72aaac2974c93df23a22378e0964e05496de23a081bc0efbacd67d1f58c89343a096f41a7c0d9ca0fbb0a9d046b9c819db7a84a75f49ab38480171d34c49560644ec9d1388b9ff189692a013c8000e8de7275442af280540483a941ccb8d00b14e95295a3964762e36dca7ffb94cf500827363ed4c44f8fec43948deee030e3bda7df04480fa53c2aef850349e22a9ee7314920e1f7183fe1d8ce223ecb8c0f1612678d3bcd1aba1cfefb3ade410163b77b9dfc1de79bac017f7b4712edebb1bbc3182931486f405ed230a43c1bf1d9843deb2619a51fe9458944313f531ef68143cc4ed797c226cc38ee40ec1715117f9634e1bac3fb457700a04", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) r4 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000b80)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/dlm_plock\x00', 0x6e00c2, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, r5, 0x80000000) 09:50:09 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r5}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x4) 09:50:09 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000ec0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000f40)=""/153, 0x99}, {&(0x7f0000001000)=""/103, 0x67}, {&(0x7f0000001080)=""/5, 0x5}, {&(0x7f00000010c0)=""/200, 0xc8}], 0x4}, 0x40) 09:50:09 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001d40)={0x9, {{0xa, 0x4e24, 0x10000, @mcast1}}, 0x0, 0x8, [{{0xa, 0x3ff, 0x5, @empty, 0x40}}, {{0xa, 0x4e21, 0x1c0, @private0={0xfc, 0x0, [], 0x1}, 0x3}}, {{0xa, 0x4e20, 0x4a8, @local, 0x563}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x7fff}}, {{0xa, 0x4e20, 0x3ff, @local, 0x3da}}, {{0xa, 0x4e21, 0x80000001, @private1={0xfc, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @empty, 0x101}}]}, 0x490) epoll_create(0x2) socket$inet_tcp(0x2, 0x1, 0x0) 09:50:09 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0xe, 0x1, 0x5, 0x39, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@local, 0xf, 0x0, 0x14}, @sadb_x_filter={0x5, 0x1a, @in=@broadcast, @in=@multicast1, 0x26, 0x32, 0x2}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_x_sec_ctx={0x16, 0x18, 0xfb, 0x1, 0xa1, "fb79bcef06456f05ba573fe7c3694df8a9826e6c51b90058740312734a95cb0aa219a0f3d8025ec119f407fa4693c5d57e7ad19dcdcfe851fe836ebe6e36c6dde2ee6efedd1e288a1da1137a61b03aae0168ab0b9ccf5b10a65ec6a0d3b2bd229734d3e91e8bddd81d89717f7e98a4a9815f238b97ca8f94149c63bc86aa077051ba61adc30d3c434c020c84eb423581443e1b4e8cdd5d918ff13688d006fea616"}, @sadb_x_sec_ctx={0x15, 0x18, 0x4, 0x0, 0x9c, "4cd30d8c134e2b75c71e06adffcd153b2c08c6253ee45d869057530ed622aa0dd08151c3852f1e9312dc76349b550f814e218d40838a6e34bec30e7abf7461b279ca057d3847cbdc6c2e213ea1ffbe517e87cc664fd88af91dec6a00ed9d6db47b39e81c97994d4d4dc82224c8262dec4f0e705e38518bbd9ba8cab358a0ef237bd95aba103b87c671917515473b974868a802ed17a770ee138b81c1"}]}, 0x1c8}}, 0x2) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x0, 0x20, 0x2, @private1, @ipv4={[], [], @private=0xa010100}, 0x700, 0x0, 0xd9, 0x3}}) socket$inet(0x2, 0x80000, 0x9) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@private2={0xfc, 0x2, [], 0x1}, r0}, 0x14) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x460444, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000003c0)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x3a}, 0x4, 0x1, 0xff, 0x8, 0x6}, &(0x7f0000000440)=0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x189000, 0x0) sendmsg$xdp(r3, &(0x7f0000000b40)={&(0x7f00000004c0)={0x2c, 0x3, r0, 0x40}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000500)="b64709555e3c0ba3ac821a901a7cdd0232ccdbbb0d22296318336dff563ff1591a1e39483521ca7cf77af04374ba65ac23ec1e60c51892566b036f5ed3ccc34e9bc9b77e85915b0b4e8eb2877407a3d68d3e400092512f8cc8c9c35e8650327e07b541676875c5edee27d804d503bc31653d3e07d3eca1fc33cdabb814b251bed5e218267648d325909982e20a3f45fce9995890fb4fe9dbdb342168b85d492020de46e2b69968a9876110ca7582d329121c6a7c5acd6ce8c76d40486fb0389c91abd6c93093c69da3ec3185ee35c6fa5692c85b", 0xd4}, {&(0x7f0000000600)="09f34097f75eb0dc06fbb466776f232836ad94a608647f1fec16bc1f9e9081477f4fccda20e9ee7924a050d64c3d9d5f1dbe6383fa72b010897d81fa61f54d5f877c073c2bcca1434f93a7e222f6a56b920c1b2184a6c72e05e49cdf811f88286a634ba15f2a45a2a72a7f055147b2a16b1fe2a553df56c90aff7c24e115dea8111b3c8f8e719e3811ef30575b2faed69e2448a531b2129c68665166f47376367a0050ad236ba40780c5a861431fc8a76abd9038cb70c67ebf66ac09e3e1aee4a5b480dab69cc141a663cda237410a7f0ef5b85b4e109f996fce73a959eb1dde881239", 0xe3}, {&(0x7f0000000700)="e4dad524cded4b996bbe03123b43d64ba1a8bc232831e713851e61796e9918fe8bb590bd594e10a87dbd0b9e48aac8cbb7b2b49fdd9deba3eda2c3213926cb56fc3ae848bcf442fca8c763fc120c6cc573a3aec5cd2b5a918c1ebd0ec0c64a8bae4494d719fa4f9285769aa13c1d222b656dd677691746f9aecb33d2c5a716aa75f280249590f314249f0c28ec9a428b011ccf59af9575c414629391e003cba6cc2b7f5208d1821d2181549336cca90b4ea16addcaec647e5911eed29248fc70a36cb7869f999b153df32df5f09422ded1502a6ce409265cb2", 0xd9}, {&(0x7f0000000800)="2cee0b97331419881e2a8f753cba323466074ebe3f97cee4a3cd3589709748d7b816e29f421da12410da11cfb10bccb0ea3e51b596153f1363d4c0383a67f2d1bdf458889d5f7d9f3c4fa72fe6abaefbfb51a35744879f2a15e94a609158993fbfb0632515d8d392e6c053850c", 0x6d}, {&(0x7f0000000880)="31039b4d2a264c04b2394e1069918ed13d5b7b1dfd0f34599b965bee5729c1aa3f45b480", 0x24}, {&(0x7f00000008c0)="269f74e805768e6ada38347cd2086c698bdde0876a22e579c779cd0b96c961093d443320755ca3eed8030c83300525bc202ffbd212233121f715da767cb655a8004d69c6d07da8fe5cd061984b4e9d3512c0ede30ae9ec1e0af317eec49fa851536621b9243da85778974fbe6780797baa713650d8fd1e3ef61380cd61603e1495acff406d1d4ed56fc4f579edf65087ff3bfffde45f0fbc917d", 0x9a}, {&(0x7f0000000980)="3bab83f28b044d88052b0b1c5d0ea9f5bd16dae875a6f488e0a525820989641e075cc62aa81f3056148c5f2ed6b1ed6498eaeb6ccd4d2a55dfa04d519b0ec102bf84a6463c3fac716394a963a1e3dd8027004a1af1fed2b9cf6ca4ca1414a71cc5ba325d8b83aae10cb9a2304357444035e265f475b01c66c2812db38401003385bd0b4628c984750ce506b3ed442408d1b1aac6318630c93cbfa001e46fd1f6d3b3eb8a4b8a8c5f31e13fe2bd606624c04b2cc1fb9cfc4c4717493b79f28dfeb924149e2907e692d51dbfe3b10ac164b620cde7e35a35ddc349d04413d9dbbf8450d22a3fe7fa643b91af1efade27998cdf901c", 0xf4}, {&(0x7f0000000a80)="61ef72e10b3c6d00c78f602e52eb9f7d57f64de14ed9795a6c61f23223", 0x1d}], 0x8, 0x0, 0x0, 0x44080}, 0x805) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000c40)=0xc00, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000d00)={0x12, 0x10, 0xfa00, {&(0x7f0000000cc0), 0xffffffffffffffff, r1}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000d40)={0x6, 0x118, 0xfa00, {{0x3ff, 0x8, "38b789924e2e1eb65dff8097995bcb91de5c5f8dce06080d8621a778e488f38b7f2872e0b8cc5b72cc35e4a273dbb2f1826ff5c5956a22aff27eb17108774fe439b1bca08bc6c05d111b04cf9181b222d4509609e0e54170012512fa1e965d88c5f9705bdeef34e0dd862e009a0aeeceb26cd5b94e65c472ee40cfa967431457d566c83dfa15b3469844454c5832d4abb84c6fe86df4c192f5f5417400c4e5ea25d23e7681d647b691e495a5b3bbe6b684bcaf13657d84660a8e36e636aaa9b9f5ef3172e8afa25334bb6dd71389874da3a24be8578a704f8954e33b17b2474447eb238ba4a0426c018edd89c71decea8b4f6f4b4673b340dac90816f04e0dad", 0x1, 0x85, 0x1, 0x0, 0x58, 0x9, 0x1f, 0x1}}}, 0x120) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000e80)) r5 = syz_open_dev$loop(&(0x7f0000000ec0)='/dev/loop#\x00', 0x9, 0x201) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000f00)={0x1, 0x4, 0xfffffffe, 0x328}) syzkaller login: [ 40.024251] IPVS: ftp: loaded support on port[0] = 21 [ 40.122959] chnl_net:caif_netlink_parms(): no params data found [ 40.189821] IPVS: ftp: loaded support on port[0] = 21 [ 40.277602] chnl_net:caif_netlink_parms(): no params data found [ 40.354591] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.362371] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.372524] device bridge_slave_0 entered promiscuous mode [ 40.399326] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.408205] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.415204] device bridge_slave_1 entered promiscuous mode [ 40.421312] IPVS: ftp: loaded support on port[0] = 21 [ 40.451307] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 40.475076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 40.507571] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 40.516978] team0: Port device team_slave_0 added [ 40.524056] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.531544] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.538946] device bridge_slave_0 entered promiscuous mode [ 40.557785] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 40.579099] team0: Port device team_slave_1 added [ 40.592711] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.602375] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.611981] device bridge_slave_1 entered promiscuous mode [ 40.637969] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.644252] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.670471] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.684621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 40.705755] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 40.734486] IPVS: ftp: loaded support on port[0] = 21 [ 40.743021] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.750234] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.781830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.813248] IPVS: ftp: loaded support on port[0] = 21 [ 40.846808] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 40.860356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 40.867637] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 40.879043] team0: Port device team_slave_0 added [ 40.888393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 40.895829] team0: Port device team_slave_1 added [ 40.941986] IPVS: ftp: loaded support on port[0] = 21 [ 40.973447] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.983220] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.009624] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 41.023882] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 41.030669] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.056564] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 41.071049] device hsr_slave_0 entered promiscuous mode [ 41.078090] device hsr_slave_1 entered promiscuous mode [ 41.086517] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 41.115118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 41.127590] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 41.149820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 41.167032] chnl_net:caif_netlink_parms(): no params data found [ 41.256770] device hsr_slave_0 entered promiscuous mode [ 41.262806] device hsr_slave_1 entered promiscuous mode [ 41.269343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 41.304595] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 41.424103] chnl_net:caif_netlink_parms(): no params data found [ 41.453923] chnl_net:caif_netlink_parms(): no params data found [ 41.524059] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.531422] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.539277] device bridge_slave_0 entered promiscuous mode [ 41.548704] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.555054] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.562097] device bridge_slave_1 entered promiscuous mode [ 41.671694] chnl_net:caif_netlink_parms(): no params data found [ 41.694693] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 41.745724] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 41.801334] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 41.820010] team0: Port device team_slave_0 added [ 41.827988] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.834361] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.847873] device bridge_slave_0 entered promiscuous mode [ 41.860495] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.868069] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.875059] device bridge_slave_1 entered promiscuous mode [ 41.889106] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 41.895726] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 41.903045] team0: Port device team_slave_1 added [ 41.921661] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.934361] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.942217] device bridge_slave_0 entered promiscuous mode [ 41.950132] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.956485] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.964432] device bridge_slave_1 entered promiscuous mode [ 41.983978] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 41.990980] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 41.997215] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.024156] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.041730] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.047938] Bluetooth: hci0: command 0x0409 tx timeout [ 42.049457] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.083949] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.095743] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 42.105119] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 42.130757] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 42.146967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 42.155017] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 42.171972] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 42.207340] Bluetooth: hci1: command 0x0409 tx timeout [ 42.214160] device hsr_slave_0 entered promiscuous mode [ 42.220771] device hsr_slave_1 entered promiscuous mode [ 42.226472] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.236688] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.244137] device bridge_slave_0 entered promiscuous mode [ 42.258270] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 42.265648] team0: Port device team_slave_0 added [ 42.272725] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 42.280393] team0: Port device team_slave_1 added [ 42.298670] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 42.305895] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 42.314613] team0: Port device team_slave_0 added [ 42.320513] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.326865] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.334815] device bridge_slave_1 entered promiscuous mode [ 42.359168] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 42.366453] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 42.374624] team0: Port device team_slave_1 added [ 42.377229] Bluetooth: hci2: command 0x0409 tx timeout [ 42.393661] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.401070] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.427647] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.464692] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.471864] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.499498] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.511808] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.518853] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.544536] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.561706] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.568331] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.593974] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.605968] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 42.613770] Bluetooth: hci3: command 0x0409 tx timeout [ 42.621080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 42.633125] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 42.642243] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 42.650466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 42.673110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 42.702018] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 42.709968] team0: Port device team_slave_0 added [ 42.716618] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 42.725185] team0: Port device team_slave_1 added [ 42.756291] device hsr_slave_0 entered promiscuous mode [ 42.761994] device hsr_slave_1 entered promiscuous mode [ 42.767178] Bluetooth: hci4: command 0x0409 tx timeout [ 42.777815] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 42.795200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.804093] device hsr_slave_0 entered promiscuous mode [ 42.810545] device hsr_slave_1 entered promiscuous mode [ 42.819216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 42.826175] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 42.844597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.850973] Bluetooth: hci5: command 0x0409 tx timeout [ 42.856525] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.883898] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.895645] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.901989] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.927619] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.942706] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 42.950195] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 42.965740] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 42.990945] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 43.001112] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.017363] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 43.023540] 8021q: adding VLAN 0 to HW filter on device team0 [ 43.050969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.058989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.073037] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.096634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 43.105420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.113534] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.120069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.159535] device hsr_slave_0 entered promiscuous mode [ 43.165526] device hsr_slave_1 entered promiscuous mode [ 43.172233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 43.182704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.206363] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 43.215009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 43.223401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.231646] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.238315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.246609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.275911] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 43.283621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 43.297981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.304930] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.333956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 43.344807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 43.370311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 43.379395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 43.389333] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.397636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 43.432501] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.459313] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.467546] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 43.474365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.482179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.489547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 43.497422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 43.509062] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.528810] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 43.534984] 8021q: adding VLAN 0 to HW filter on device team0 [ 43.545411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.566740] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 43.573773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 43.583261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.591378] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.597786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.605131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 43.613581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.624812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.643618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 43.653860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 43.663042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 43.671358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.679759] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.686207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.694357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 43.702600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.719734] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.733472] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.744017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.758570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 43.766302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 43.780605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 43.788995] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 43.795052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 43.817511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 43.825220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 43.833937] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 43.865412] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 43.875715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 43.889279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 43.897925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 43.905522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 43.913380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.921596] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 43.931155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 43.943912] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 43.955665] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 43.962787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 43.971669] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.981111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.989085] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 43.995760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.003722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.011546] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.018346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.039399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 44.054094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.073905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.083661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.093760] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 44.108054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 44.114655] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 44.121983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.126980] Bluetooth: hci0: command 0x041b tx timeout [ 44.135708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.147623] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 44.157500] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 44.163583] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.177076] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 44.187337] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.196038] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 44.204756] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 44.212951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.222881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.230053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.240501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.247888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.254716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.271857] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 44.286020] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.286517] Bluetooth: hci1: command 0x041b tx timeout [ 44.298513] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 44.310634] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 44.317715] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.325591] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 44.332572] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.343648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.354550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.363377] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.369766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.380587] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 44.391386] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 44.403018] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.415526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.423342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.434396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.442872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.446490] Bluetooth: hci2: command 0x041b tx timeout [ 44.451024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.463749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.471779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.479917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.487599] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.493935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.500893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.509054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.516759] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.526070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.534677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.550205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.557897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.565062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.576930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.584805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.597100] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.603452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.610825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.618878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.627566] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.633924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.645182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.655415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.665277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.676494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.686025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.694887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.704689] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.711101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.718865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.730369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.737203] Bluetooth: hci3: command 0x041b tx timeout [ 44.743311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.755828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.767880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.776791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.783672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.794808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.803105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.814361] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 44.821929] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 44.829024] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 44.838449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.849561] Bluetooth: hci4: command 0x041b tx timeout [ 44.850728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.862867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.870988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.880251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.888286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.899236] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 44.907356] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 44.919236] device veth0_vlan entered promiscuous mode [ 44.927508] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.935058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 44.946289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.955921] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 44.962495] Bluetooth: hci5: command 0x041b tx timeout [ 44.970450] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 44.978061] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 44.984797] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 44.993723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 45.003511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.014380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 45.022446] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.032898] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.040486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.048066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.055004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.063478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.071523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.080362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.089351] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.097709] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.106142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 45.114828] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 45.130165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 45.138799] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 45.144926] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.155801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.165049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.173979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 45.181602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.189529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.197660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.205490] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.212580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.223333] device veth0_vlan entered promiscuous mode [ 45.232260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 45.247260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 45.256720] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.264244] device veth1_vlan entered promiscuous mode [ 45.272224] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 45.286604] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 45.294001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.304943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.312573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.320848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.328552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.336585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.345747] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.352144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.359122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.370214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 45.379711] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 45.391013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 45.403899] device veth1_vlan entered promiscuous mode [ 45.412549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.421243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.429500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.437798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.445152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.453480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.464640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 45.476726] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 45.482741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.509869] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 45.516078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.523045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.531407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.542131] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 45.548392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.559638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.571300] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 45.584256] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 45.609184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.617880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.625433] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.631914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.643292] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 45.657757] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 45.670040] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 45.677013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.683729] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.695316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.702764] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 45.714630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.725298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.734697] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 45.745152] device veth0_macvtap entered promiscuous mode [ 45.754122] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 45.762490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 45.771349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.779590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.788272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.797680] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 45.807873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 45.815924] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 45.823824] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 45.832553] device veth1_macvtap entered promiscuous mode [ 45.839947] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 45.859100] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 45.872142] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 45.879924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.888405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.897608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.905457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.913837] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.920878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.928355] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.935060] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.942597] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.952755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 45.967923] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 45.977360] device veth0_macvtap entered promiscuous mode [ 45.984179] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 45.995196] device veth1_macvtap entered promiscuous mode [ 46.002569] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 46.009666] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 46.017419] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.024508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.032704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.043719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 46.054809] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 46.071591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 46.083118] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.090933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.098873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.107652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.115469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.130042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 46.139249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 46.149631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 46.158407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.166421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.176639] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.189162] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 46.197259] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 46.207454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 46.216742] Bluetooth: hci0: command 0x040f tx timeout [ 46.248590] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.256872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.265857] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 46.273268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.289108] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 46.296124] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 46.320045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.328418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.338503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 46.349490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 46.360029] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 46.369458] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 46.376197] Bluetooth: hci1: command 0x040f tx timeout [ 46.386664] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 46.394119] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 46.402638] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 46.411719] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 46.419443] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.432167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.442020] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 46.454298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 46.465123] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 46.472652] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 46.485127] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 46.493897] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 46.501691] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.510534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.518951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.526648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.533350] Bluetooth: hci2: command 0x040f tx timeout [ 46.543365] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 46.551641] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 46.566937] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 46.581036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.588164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.603993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.612255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.620801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.629364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.636633] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.645429] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 46.664373] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 46.682448] device veth0_vlan entered promiscuous mode [ 46.694267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.710112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.736058] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 46.753125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.765137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.783427] Bluetooth: hci3: command 0x040f tx timeout [ 46.792301] device veth1_vlan entered promiscuous mode [ 46.799999] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 46.810069] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 46.823158] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 46.834384] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 46.841766] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 46.865381] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 46.889416] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 46.911674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 46.921974] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 46.930513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.938366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.949925] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 46.957461] Bluetooth: hci4: command 0x040f tx timeout [ 46.962182] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 46.970901] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 46.986631] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 47.004469] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 47.005544] Bluetooth: hci5: command 0x040f tx timeout [ 47.014016] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 47.026885] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 47.033381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.045644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.052757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.060899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.069168] device veth0_vlan entered promiscuous mode [ 47.083043] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 47.094806] device veth0_macvtap entered promiscuous mode [ 47.102515] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 47.120987] device veth1_vlan entered promiscuous mode [ 47.127903] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 47.135060] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.147099] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.154475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.164990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.174568] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.182830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.191404] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 47.198793] device veth1_macvtap entered promiscuous mode [ 47.212339] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 47.222361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 47.233951] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.244887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.253101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.267090] device veth0_vlan entered promiscuous mode [ 47.294635] device veth0_vlan entered promiscuous mode [ 47.308737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 47.335679] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.342750] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.358259] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 47.370191] device veth1_vlan entered promiscuous mode [ 47.376437] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 47.387002] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 47.413514] device veth1_vlan entered promiscuous mode [ 47.420313] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 47.432140] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.444467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.453643] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.463421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.473874] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 47.481992] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.490381] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 47.510590] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 47.518788] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.526524] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.533728] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.542013] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.549551] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.557962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.580106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.590256] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.599559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.610368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.620952] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 47.629442] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.646222] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 47.657580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.665545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.673384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.681785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.692200] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 47.708307] device veth0_macvtap entered promiscuous mode [ 47.714650] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 47.725972] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.738918] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.754587] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 47.771964] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 47.782835] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.791637] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 47.803414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.816608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.827338] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 47.834436] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.842844] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.844268] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 47.861127] device veth1_macvtap entered promiscuous mode [ 47.867927] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 47.874819] device veth0_macvtap entered promiscuous mode [ 47.882735] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 47.893618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.901866] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.913746] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 47.921765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.931573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.941519] device veth0_macvtap entered promiscuous mode [ 47.948533] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 47.959207] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 47.967061] device veth1_macvtap entered promiscuous mode [ 47.973146] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 47.992771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 48.005936] device veth1_macvtap entered promiscuous mode [ 48.012444] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 48.030242] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.032246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 48.052511] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.057222] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 48.071502] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 48.080480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.088372] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.096297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.103685] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 48.113457] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 48.127745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.139166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.154471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.170479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.194656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.214414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.227752] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 48.235675] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.246810] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 48.256816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 48.264764] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.277306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.277604] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.296522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 09:50:18 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socketpair(0x8, 0xf, 0xffffffff, &(0x7f0000006f40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000006f80), &(0x7f0000006fc0)=0x14) socket$inet6(0xa, 0x1, 0x5) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000007000)=0x589, 0x4) [ 48.316345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.335270] Bluetooth: hci0: command 0x0419 tx timeout [ 48.344565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:50:18 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socketpair(0x8, 0xf, 0xffffffff, &(0x7f0000006f40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000006f80), &(0x7f0000006fc0)=0x14) socket$inet6(0xa, 0x1, 0x5) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000007000)=0x589, 0x4) [ 48.359816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.371138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.383019] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.398384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.419185] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 48.427349] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.436878] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.451975] Bluetooth: hci1: command 0x0419 tx timeout 09:50:18 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socketpair(0x8, 0xf, 0xffffffff, &(0x7f0000006f40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000006f80), &(0x7f0000006fc0)=0x14) socket$inet6(0xa, 0x1, 0x5) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000007000)=0x589, 0x4) [ 48.465864] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.476051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.490692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.500886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.512840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.522498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.538387] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.550060] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 48.561501] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.573044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.584679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.596000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.607228] Bluetooth: hci2: command 0x0419 tx timeout [ 48.613054] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:50:18 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socketpair(0x8, 0xf, 0xffffffff, &(0x7f0000006f40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000006f80), &(0x7f0000006fc0)=0x14) socket$inet6(0xa, 0x1, 0x5) [ 48.622944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.637559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.647050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.659432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.669313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.680593] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.693100] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 48.703227] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.718830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 48.729811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.743831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.752305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.761818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 09:50:18 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socketpair(0x8, 0xf, 0xffffffff, &(0x7f0000006f40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000006f80), &(0x7f0000006fc0)=0x14) socket$inet6(0xa, 0x1, 0x5) [ 48.771284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.783815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.808423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.824919] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.834046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.845870] Bluetooth: hci3: command 0x0419 tx timeout [ 48.865562] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:50:18 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "aa93a12e4f72aaac2974c93df23a22378e0964e05496de23a081bc0efbacd67d1f58c89343a096f41a7c0d9ca0fbb0a9d046b9c819db7a84a75f49ab38480171d34c49560644ec9d1388b9ff189692a013c8000e8de7275442af280540483a941ccb8d00b14e95295a3964762e36dca7ffb94cf500827363ed4c44f8fec43948deee030e3bda7df04480fa53c2aef850349e22a9ee7314920e1f7183fe1d8ce223ecb8c0f1612678d3bcd1aba1cfefb3ade410163b77b9dfc1de79bac017f7b4712edebb1bbc3182931486f405ed230a43c1bf1d9843deb2619a51fe9458944313f531ef68143cc4ed797c226cc38ee40ec1715117f9634e1bac3fb457700a04", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) r4 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000b80)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/dlm_plock\x00', 0x6e00c2, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, r5, 0x80000000) [ 48.885739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.910381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:50:18 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socketpair(0x8, 0xf, 0xffffffff, &(0x7f0000006f40)) socket$inet6(0xa, 0x1, 0x5) 09:50:18 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "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", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) r4 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000b80)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/dlm_plock\x00', 0x6e00c2, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, r5, 0x80000000) [ 48.931646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.975082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.994253] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 49.005178] Bluetooth: hci4: command 0x0419 tx timeout [ 49.018073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.037945] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.055599] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.070739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.082593] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.093770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.094863] Bluetooth: hci5: command 0x0419 tx timeout [ 49.104653] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.119647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.130543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.141065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.151352] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.161984] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 49.170584] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.191528] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.210148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.219790] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.229212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.337385] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 49.343782] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.380124] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.392988] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.413965] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 49.424069] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.440593] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.453428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:50:19 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r5}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x4) [ 49.639671] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 49.659684] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.669194] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.690412] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.727291] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 49.735962] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 49.763444] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.771553] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.781015] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 49.791654] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.794013] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 49.804425] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.816503] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.828266] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.840032] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.845053] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 49.854267] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.857998] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.863257] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.874695] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.887101] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.895541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.903328] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.910522] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.960821] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1850 [ 49.985086] in_atomic(): 0, irqs_disabled(): 0, pid: 2897, name: kworker/u4:4 09:50:20 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000006f00)={@mcast1, 0x4, r5}) socket$inet6(0xa, 0x1, 0x5) 09:50:20 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "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", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) r4 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000b80)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/dlm_plock\x00', 0x6e00c2, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, r5, 0x80000000) [ 50.009333] 4 locks held by kworker/u4:4/2897: [ 50.019164] #0: 000000009ef44ab0 ((wq_completion)"%s"wiphy_name(local->hw.wiphy)){+.+.}, at: process_one_work+0x767/0x1570 [ 50.031565] #1: 0000000053b37efe ((work_completion)(&sdata->work)){+.+.}, at: process_one_work+0x79c/0x1570 09:50:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r5}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x4) 09:50:20 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000ec0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000f40)=""/153, 0x99}, {&(0x7f0000001000)=""/103, 0x67}, {&(0x7f0000001080)=""/5, 0x5}, {&(0x7f00000010c0)=""/200, 0xc8}], 0x4}, 0x40) 09:50:20 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0xe, 0x1, 0x5, 0x39, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@local, 0xf, 0x0, 0x14}, @sadb_x_filter={0x5, 0x1a, @in=@broadcast, @in=@multicast1, 0x26, 0x32, 0x2}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_x_sec_ctx={0x16, 0x18, 0xfb, 0x1, 0xa1, "fb79bcef06456f05ba573fe7c3694df8a9826e6c51b90058740312734a95cb0aa219a0f3d8025ec119f407fa4693c5d57e7ad19dcdcfe851fe836ebe6e36c6dde2ee6efedd1e288a1da1137a61b03aae0168ab0b9ccf5b10a65ec6a0d3b2bd229734d3e91e8bddd81d89717f7e98a4a9815f238b97ca8f94149c63bc86aa077051ba61adc30d3c434c020c84eb423581443e1b4e8cdd5d918ff13688d006fea616"}, @sadb_x_sec_ctx={0x15, 0x18, 0x4, 0x0, 0x9c, "4cd30d8c134e2b75c71e06adffcd153b2c08c6253ee45d869057530ed622aa0dd08151c3852f1e9312dc76349b550f814e218d40838a6e34bec30e7abf7461b279ca057d3847cbdc6c2e213ea1ffbe517e87cc664fd88af91dec6a00ed9d6db47b39e81c97994d4d4dc82224c8262dec4f0e705e38518bbd9ba8cab358a0ef237bd95aba103b87c671917515473b974868a802ed17a770ee138b81c1"}]}, 0x1c8}}, 0x2) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x0, 0x20, 0x2, @private1, @ipv4={[], [], @private=0xa010100}, 0x700, 0x0, 0xd9, 0x3}}) socket$inet(0x2, 0x80000, 0x9) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@private2={0xfc, 0x2, [], 0x1}, r0}, 0x14) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x460444, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000003c0)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x3a}, 0x4, 0x1, 0xff, 0x8, 0x6}, &(0x7f0000000440)=0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x189000, 0x0) sendmsg$xdp(r3, &(0x7f0000000b40)={&(0x7f00000004c0)={0x2c, 0x3, r0, 0x40}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000500)="b64709555e3c0ba3ac821a901a7cdd0232ccdbbb0d22296318336dff563ff1591a1e39483521ca7cf77af04374ba65ac23ec1e60c51892566b036f5ed3ccc34e9bc9b77e85915b0b4e8eb2877407a3d68d3e400092512f8cc8c9c35e8650327e07b541676875c5edee27d804d503bc31653d3e07d3eca1fc33cdabb814b251bed5e218267648d325909982e20a3f45fce9995890fb4fe9dbdb342168b85d492020de46e2b69968a9876110ca7582d329121c6a7c5acd6ce8c76d40486fb0389c91abd6c93093c69da3ec3185ee35c6fa5692c85b", 0xd4}, {&(0x7f0000000600)="09f34097f75eb0dc06fbb466776f232836ad94a608647f1fec16bc1f9e9081477f4fccda20e9ee7924a050d64c3d9d5f1dbe6383fa72b010897d81fa61f54d5f877c073c2bcca1434f93a7e222f6a56b920c1b2184a6c72e05e49cdf811f88286a634ba15f2a45a2a72a7f055147b2a16b1fe2a553df56c90aff7c24e115dea8111b3c8f8e719e3811ef30575b2faed69e2448a531b2129c68665166f47376367a0050ad236ba40780c5a861431fc8a76abd9038cb70c67ebf66ac09e3e1aee4a5b480dab69cc141a663cda237410a7f0ef5b85b4e109f996fce73a959eb1dde881239", 0xe3}, {&(0x7f0000000700)="e4dad524cded4b996bbe03123b43d64ba1a8bc232831e713851e61796e9918fe8bb590bd594e10a87dbd0b9e48aac8cbb7b2b49fdd9deba3eda2c3213926cb56fc3ae848bcf442fca8c763fc120c6cc573a3aec5cd2b5a918c1ebd0ec0c64a8bae4494d719fa4f9285769aa13c1d222b656dd677691746f9aecb33d2c5a716aa75f280249590f314249f0c28ec9a428b011ccf59af9575c414629391e003cba6cc2b7f5208d1821d2181549336cca90b4ea16addcaec647e5911eed29248fc70a36cb7869f999b153df32df5f09422ded1502a6ce409265cb2", 0xd9}, {&(0x7f0000000800)="2cee0b97331419881e2a8f753cba323466074ebe3f97cee4a3cd3589709748d7b816e29f421da12410da11cfb10bccb0ea3e51b596153f1363d4c0383a67f2d1bdf458889d5f7d9f3c4fa72fe6abaefbfb51a35744879f2a15e94a609158993fbfb0632515d8d392e6c053850c", 0x6d}, {&(0x7f0000000880)="31039b4d2a264c04b2394e1069918ed13d5b7b1dfd0f34599b965bee5729c1aa3f45b480", 0x24}, {&(0x7f00000008c0)="269f74e805768e6ada38347cd2086c698bdde0876a22e579c779cd0b96c961093d443320755ca3eed8030c83300525bc202ffbd212233121f715da767cb655a8004d69c6d07da8fe5cd061984b4e9d3512c0ede30ae9ec1e0af317eec49fa851536621b9243da85778974fbe6780797baa713650d8fd1e3ef61380cd61603e1495acff406d1d4ed56fc4f579edf65087ff3bfffde45f0fbc917d", 0x9a}, {&(0x7f0000000980)="3bab83f28b044d88052b0b1c5d0ea9f5bd16dae875a6f488e0a525820989641e075cc62aa81f3056148c5f2ed6b1ed6498eaeb6ccd4d2a55dfa04d519b0ec102bf84a6463c3fac716394a963a1e3dd8027004a1af1fed2b9cf6ca4ca1414a71cc5ba325d8b83aae10cb9a2304357444035e265f475b01c66c2812db38401003385bd0b4628c984750ce506b3ed442408d1b1aac6318630c93cbfa001e46fd1f6d3b3eb8a4b8a8c5f31e13fe2bd606624c04b2cc1fb9cfc4c4717493b79f28dfeb924149e2907e692d51dbfe3b10ac164b620cde7e35a35ddc349d04413d9dbbf8450d22a3fe7fa643b91af1efade27998cdf901c", 0xf4}, {&(0x7f0000000a80)="61ef72e10b3c6d00c78f602e52eb9f7d57f64de14ed9795a6c61f23223", 0x1d}], 0x8, 0x0, 0x0, 0x44080}, 0x805) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000c40)=0xc00, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000d00)={0x12, 0x10, 0xfa00, {&(0x7f0000000cc0), 0xffffffffffffffff, r1}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000d40)={0x6, 0x118, 0xfa00, {{0x3ff, 0x8, "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", 0x1, 0x85, 0x1, 0x0, 0x58, 0x9, 0x1f, 0x1}}}, 0x120) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000e80)) r5 = syz_open_dev$loop(&(0x7f0000000ec0)='/dev/loop#\x00', 0x9, 0x201) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000f00)={0x1, 0x4, 0xfffffffe, 0x328}) 09:50:20 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001d40)={0x9, {{0xa, 0x4e24, 0x10000, @mcast1}}, 0x0, 0x8, [{{0xa, 0x3ff, 0x5, @empty, 0x40}}, {{0xa, 0x4e21, 0x1c0, @private0={0xfc, 0x0, [], 0x1}, 0x3}}, {{0xa, 0x4e20, 0x4a8, @local, 0x563}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x7fff}}, {{0xa, 0x4e20, 0x3ff, @local, 0x3da}}, {{0xa, 0x4e21, 0x80000001, @private1={0xfc, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @empty, 0x101}}]}, 0x490) epoll_create(0x2) socket$inet_tcp(0x2, 0x1, 0x0) [ 50.092944] #2: 0000000019c370d8 (&wdev->mtx){+.+.}, at: ieee80211_ibss_work+0x85/0xe10 [ 50.114193] #3: 00000000c876d0bc (rcu_read_lock){....}, at: sta_info_insert_rcu+0x48e/0x2310 [ 50.126135] Preemption disabled at: [ 50.126154] [] rcu_lockdep_current_cpu_online+0x32/0x1b0 09:50:20 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "aa93a12e4f72aaac2974c93df23a22378e0964e05496de23a081bc0efbacd67d1f58c89343a096f41a7c0d9ca0fbb0a9d046b9c819db7a84a75f49ab38480171d34c49560644ec9d1388b9ff189692a013c8000e8de7275442af280540483a941ccb8d00b14e95295a3964762e36dca7ffb94cf500827363ed4c44f8fec43948deee030e3bda7df04480fa53c2aef850349e22a9ee7314920e1f7183fe1d8ce223ecb8c0f1612678d3bcd1aba1cfefb3ade410163b77b9dfc1de79bac017f7b4712edebb1bbc3182931486f405ed230a43c1bf1d9843deb2619a51fe9458944313f531ef68143cc4ed797c226cc38ee40ec1715117f9634e1bac3fb457700a04", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) r4 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000b80)) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x80000000) [ 50.201978] CPU: 0 PID: 2897 Comm: kworker/u4:4 Not tainted 4.19.159-syzkaller #0 [ 50.209641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.219008] Workqueue: phy12 ieee80211_iface_work [ 50.223848] Call Trace: [ 50.226445] dump_stack+0x1fc/0x2fe [ 50.230078] ? rcu_lockdep_current_cpu_online+0x32/0x1b0 [ 50.235532] ___might_sleep.cold+0x235/0x250 [ 50.239975] sta_info_move_state+0x32/0x900 [ 50.244320] sta_info_free+0x55/0x390 [ 50.248134] sta_info_insert_rcu+0x517/0x2310 [ 50.252646] ? __local_bh_enable_ip+0x159/0x270 [ 50.257328] ? check_preemption_disabled+0x41/0x280 [ 50.262354] ? minstrel_ht_rate_update+0x40/0x40 [ 50.267117] ? rate_control_rate_init+0x2fa/0x4f0 [ 50.271976] ieee80211_ibss_finish_sta+0x25b/0x360 [ 50.276916] ? ieee80211_sta_join_ibss+0xe50/0xe50 [ 50.281854] ? mark_held_locks+0xa6/0xf0 [ 50.285935] ? __local_bh_enable_ip+0x159/0x270 [ 50.290615] ieee80211_ibss_work+0x2b6/0xe10 [ 50.295036] ? ieee80211_ibss_rx_queued_mgmt+0x18b0/0x18b0 09:50:20 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001d40)={0x9, {{0xa, 0x4e24, 0x10000, @mcast1}}, 0x0, 0x8, [{{0xa, 0x3ff, 0x5, @empty, 0x40}}, {{0xa, 0x4e21, 0x1c0, @private0={0xfc, 0x0, [], 0x1}, 0x3}}, {{0xa, 0x4e20, 0x4a8, @local, 0x563}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x7fff}}, {{0xa, 0x4e20, 0x3ff, @local, 0x3da}}, {{0xa, 0x4e21, 0x80000001, @private1={0xfc, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @empty, 0x101}}]}, 0x490) epoll_create(0x2) socket$inet_tcp(0x2, 0x1, 0x0) [ 50.300659] ? mark_held_locks+0xa6/0xf0 [ 50.304732] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 50.309842] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 50.314455] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 50.319911] ieee80211_iface_work+0x7ba/0x8a0 [ 50.324425] process_one_work+0x864/0x1570 [ 50.328669] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 50.333352] worker_thread+0x64c/0x1130 [ 50.337514] ? __kthread_parkme+0x133/0x1e0 [ 50.341847] ? process_one_work+0x1570/0x1570 [ 50.346377] kthread+0x33f/0x460 09:50:20 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0xe, 0x1, 0x5, 0x39, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@local, 0xf, 0x0, 0x14}, @sadb_x_filter={0x5, 0x1a, @in=@broadcast, @in=@multicast1, 0x26, 0x32, 0x2}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_x_sec_ctx={0x16, 0x18, 0xfb, 0x1, 0xa1, "fb79bcef06456f05ba573fe7c3694df8a9826e6c51b90058740312734a95cb0aa219a0f3d8025ec119f407fa4693c5d57e7ad19dcdcfe851fe836ebe6e36c6dde2ee6efedd1e288a1da1137a61b03aae0168ab0b9ccf5b10a65ec6a0d3b2bd229734d3e91e8bddd81d89717f7e98a4a9815f238b97ca8f94149c63bc86aa077051ba61adc30d3c434c020c84eb423581443e1b4e8cdd5d918ff13688d006fea616"}, @sadb_x_sec_ctx={0x15, 0x18, 0x4, 0x0, 0x9c, "4cd30d8c134e2b75c71e06adffcd153b2c08c6253ee45d869057530ed622aa0dd08151c3852f1e9312dc76349b550f814e218d40838a6e34bec30e7abf7461b279ca057d3847cbdc6c2e213ea1ffbe517e87cc664fd88af91dec6a00ed9d6db47b39e81c97994d4d4dc82224c8262dec4f0e705e38518bbd9ba8cab358a0ef237bd95aba103b87c671917515473b974868a802ed17a770ee138b81c1"}]}, 0x1c8}}, 0x2) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x0, 0x20, 0x2, @private1, @ipv4={[], [], @private=0xa010100}, 0x700, 0x0, 0xd9, 0x3}}) socket$inet(0x2, 0x80000, 0x9) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@private2={0xfc, 0x2, [], 0x1}, r0}, 0x14) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x460444, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000003c0)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x3a}, 0x4, 0x1, 0xff, 0x8, 0x6}, &(0x7f0000000440)=0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x189000, 0x0) sendmsg$xdp(r3, &(0x7f0000000b40)={&(0x7f00000004c0)={0x2c, 0x3, r0, 0x40}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000500)="b64709555e3c0ba3ac821a901a7cdd0232ccdbbb0d22296318336dff563ff1591a1e39483521ca7cf77af04374ba65ac23ec1e60c51892566b036f5ed3ccc34e9bc9b77e85915b0b4e8eb2877407a3d68d3e400092512f8cc8c9c35e8650327e07b541676875c5edee27d804d503bc31653d3e07d3eca1fc33cdabb814b251bed5e218267648d325909982e20a3f45fce9995890fb4fe9dbdb342168b85d492020de46e2b69968a9876110ca7582d329121c6a7c5acd6ce8c76d40486fb0389c91abd6c93093c69da3ec3185ee35c6fa5692c85b", 0xd4}, {&(0x7f0000000600)="09f34097f75eb0dc06fbb466776f232836ad94a608647f1fec16bc1f9e9081477f4fccda20e9ee7924a050d64c3d9d5f1dbe6383fa72b010897d81fa61f54d5f877c073c2bcca1434f93a7e222f6a56b920c1b2184a6c72e05e49cdf811f88286a634ba15f2a45a2a72a7f055147b2a16b1fe2a553df56c90aff7c24e115dea8111b3c8f8e719e3811ef30575b2faed69e2448a531b2129c68665166f47376367a0050ad236ba40780c5a861431fc8a76abd9038cb70c67ebf66ac09e3e1aee4a5b480dab69cc141a663cda237410a7f0ef5b85b4e109f996fce73a959eb1dde881239", 0xe3}, {&(0x7f0000000700)="e4dad524cded4b996bbe03123b43d64ba1a8bc232831e713851e61796e9918fe8bb590bd594e10a87dbd0b9e48aac8cbb7b2b49fdd9deba3eda2c3213926cb56fc3ae848bcf442fca8c763fc120c6cc573a3aec5cd2b5a918c1ebd0ec0c64a8bae4494d719fa4f9285769aa13c1d222b656dd677691746f9aecb33d2c5a716aa75f280249590f314249f0c28ec9a428b011ccf59af9575c414629391e003cba6cc2b7f5208d1821d2181549336cca90b4ea16addcaec647e5911eed29248fc70a36cb7869f999b153df32df5f09422ded1502a6ce409265cb2", 0xd9}, {&(0x7f0000000800)="2cee0b97331419881e2a8f753cba323466074ebe3f97cee4a3cd3589709748d7b816e29f421da12410da11cfb10bccb0ea3e51b596153f1363d4c0383a67f2d1bdf458889d5f7d9f3c4fa72fe6abaefbfb51a35744879f2a15e94a609158993fbfb0632515d8d392e6c053850c", 0x6d}, {&(0x7f0000000880)="31039b4d2a264c04b2394e1069918ed13d5b7b1dfd0f34599b965bee5729c1aa3f45b480", 0x24}, {&(0x7f00000008c0)="269f74e805768e6ada38347cd2086c698bdde0876a22e579c779cd0b96c961093d443320755ca3eed8030c83300525bc202ffbd212233121f715da767cb655a8004d69c6d07da8fe5cd061984b4e9d3512c0ede30ae9ec1e0af317eec49fa851536621b9243da85778974fbe6780797baa713650d8fd1e3ef61380cd61603e1495acff406d1d4ed56fc4f579edf65087ff3bfffde45f0fbc917d", 0x9a}, {&(0x7f0000000980)="3bab83f28b044d88052b0b1c5d0ea9f5bd16dae875a6f488e0a525820989641e075cc62aa81f3056148c5f2ed6b1ed6498eaeb6ccd4d2a55dfa04d519b0ec102bf84a6463c3fac716394a963a1e3dd8027004a1af1fed2b9cf6ca4ca1414a71cc5ba325d8b83aae10cb9a2304357444035e265f475b01c66c2812db38401003385bd0b4628c984750ce506b3ed442408d1b1aac6318630c93cbfa001e46fd1f6d3b3eb8a4b8a8c5f31e13fe2bd606624c04b2cc1fb9cfc4c4717493b79f28dfeb924149e2907e692d51dbfe3b10ac164b620cde7e35a35ddc349d04413d9dbbf8450d22a3fe7fa643b91af1efade27998cdf901c", 0xf4}, {&(0x7f0000000a80)="61ef72e10b3c6d00c78f602e52eb9f7d57f64de14ed9795a6c61f23223", 0x1d}], 0x8, 0x0, 0x0, 0x44080}, 0x805) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000c40)=0xc00, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000d00)={0x12, 0x10, 0xfa00, {&(0x7f0000000cc0), 0xffffffffffffffff, r1}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000d40)={0x6, 0x118, 0xfa00, {{0x3ff, 0x8, "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", 0x1, 0x85, 0x1, 0x0, 0x58, 0x9, 0x1f, 0x1}}}, 0x120) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000e80)) r5 = syz_open_dev$loop(&(0x7f0000000ec0)='/dev/loop#\x00', 0x9, 0x201) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000f00)={0x1, 0x4, 0xfffffffe, 0x328}) 09:50:20 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "aa93a12e4f72aaac2974c93df23a22378e0964e05496de23a081bc0efbacd67d1f58c89343a096f41a7c0d9ca0fbb0a9d046b9c819db7a84a75f49ab38480171d34c49560644ec9d1388b9ff189692a013c8000e8de7275442af280540483a941ccb8d00b14e95295a3964762e36dca7ffb94cf500827363ed4c44f8fec43948deee030e3bda7df04480fa53c2aef850349e22a9ee7314920e1f7183fe1d8ce223ecb8c0f1612678d3bcd1aba1cfefb3ade410163b77b9dfc1de79bac017f7b4712edebb1bbc3182931486f405ed230a43c1bf1d9843deb2619a51fe9458944313f531ef68143cc4ed797c226cc38ee40ec1715117f9634e1bac3fb457700a04", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) socket$inet(0x2, 0x3, 0x3) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x80000000) [ 50.349753] ? kthread_park+0x180/0x180 [ 50.353915] ret_from_fork+0x24/0x30 09:50:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r5}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x4) 09:50:20 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000ec0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000f40)=""/153, 0x99}, {&(0x7f0000001000)=""/103, 0x67}, {&(0x7f0000001080)=""/5, 0x5}, {&(0x7f00000010c0)=""/200, 0xc8}], 0x4}, 0x40) 09:50:20 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006dc0)={{{@in=@broadcast}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000006ec0)=0xe8) socket$inet6(0xa, 0x1, 0x5) 09:50:20 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "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", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x80000000) 09:50:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r5}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000780), &(0x7f00000007c0)=0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) 09:50:20 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001d40)={0x9, {{0xa, 0x4e24, 0x10000, @mcast1}}, 0x0, 0x8, [{{0xa, 0x3ff, 0x5, @empty, 0x40}}, {{0xa, 0x4e21, 0x1c0, @private0={0xfc, 0x0, [], 0x1}, 0x3}}, {{0xa, 0x4e20, 0x4a8, @local, 0x563}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x7fff}}, {{0xa, 0x4e20, 0x3ff, @local, 0x3da}}, {{0xa, 0x4e21, 0x80000001, @private1={0xfc, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @empty, 0x101}}]}, 0x490) epoll_create(0x2) socket$inet_tcp(0x2, 0x1, 0x0) 09:50:20 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000ec0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000f40)=""/153, 0x99}, {&(0x7f0000001000)=""/103, 0x67}, {&(0x7f0000001080)=""/5, 0x5}, {&(0x7f00000010c0)=""/200, 0xc8}], 0x4}, 0x40) 09:50:20 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0xe, 0x1, 0x5, 0x39, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@local, 0xf, 0x0, 0x14}, @sadb_x_filter={0x5, 0x1a, @in=@broadcast, @in=@multicast1, 0x26, 0x32, 0x2}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_x_sec_ctx={0x16, 0x18, 0xfb, 0x1, 0xa1, "fb79bcef06456f05ba573fe7c3694df8a9826e6c51b90058740312734a95cb0aa219a0f3d8025ec119f407fa4693c5d57e7ad19dcdcfe851fe836ebe6e36c6dde2ee6efedd1e288a1da1137a61b03aae0168ab0b9ccf5b10a65ec6a0d3b2bd229734d3e91e8bddd81d89717f7e98a4a9815f238b97ca8f94149c63bc86aa077051ba61adc30d3c434c020c84eb423581443e1b4e8cdd5d918ff13688d006fea616"}, @sadb_x_sec_ctx={0x15, 0x18, 0x4, 0x0, 0x9c, "4cd30d8c134e2b75c71e06adffcd153b2c08c6253ee45d869057530ed622aa0dd08151c3852f1e9312dc76349b550f814e218d40838a6e34bec30e7abf7461b279ca057d3847cbdc6c2e213ea1ffbe517e87cc664fd88af91dec6a00ed9d6db47b39e81c97994d4d4dc82224c8262dec4f0e705e38518bbd9ba8cab358a0ef237bd95aba103b87c671917515473b974868a802ed17a770ee138b81c1"}]}, 0x1c8}}, 0x2) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x0, 0x20, 0x2, @private1, @ipv4={[], [], @private=0xa010100}, 0x700, 0x0, 0xd9, 0x3}}) socket$inet(0x2, 0x80000, 0x9) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@private2={0xfc, 0x2, [], 0x1}, r0}, 0x14) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x460444, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000003c0)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x3a}, 0x4, 0x1, 0xff, 0x8, 0x6}, &(0x7f0000000440)=0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x189000, 0x0) sendmsg$xdp(r3, &(0x7f0000000b40)={&(0x7f00000004c0)={0x2c, 0x3, r0, 0x40}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000500)="b64709555e3c0ba3ac821a901a7cdd0232ccdbbb0d22296318336dff563ff1591a1e39483521ca7cf77af04374ba65ac23ec1e60c51892566b036f5ed3ccc34e9bc9b77e85915b0b4e8eb2877407a3d68d3e400092512f8cc8c9c35e8650327e07b541676875c5edee27d804d503bc31653d3e07d3eca1fc33cdabb814b251bed5e218267648d325909982e20a3f45fce9995890fb4fe9dbdb342168b85d492020de46e2b69968a9876110ca7582d329121c6a7c5acd6ce8c76d40486fb0389c91abd6c93093c69da3ec3185ee35c6fa5692c85b", 0xd4}, {&(0x7f0000000600)="09f34097f75eb0dc06fbb466776f232836ad94a608647f1fec16bc1f9e9081477f4fccda20e9ee7924a050d64c3d9d5f1dbe6383fa72b010897d81fa61f54d5f877c073c2bcca1434f93a7e222f6a56b920c1b2184a6c72e05e49cdf811f88286a634ba15f2a45a2a72a7f055147b2a16b1fe2a553df56c90aff7c24e115dea8111b3c8f8e719e3811ef30575b2faed69e2448a531b2129c68665166f47376367a0050ad236ba40780c5a861431fc8a76abd9038cb70c67ebf66ac09e3e1aee4a5b480dab69cc141a663cda237410a7f0ef5b85b4e109f996fce73a959eb1dde881239", 0xe3}, {&(0x7f0000000700)="e4dad524cded4b996bbe03123b43d64ba1a8bc232831e713851e61796e9918fe8bb590bd594e10a87dbd0b9e48aac8cbb7b2b49fdd9deba3eda2c3213926cb56fc3ae848bcf442fca8c763fc120c6cc573a3aec5cd2b5a918c1ebd0ec0c64a8bae4494d719fa4f9285769aa13c1d222b656dd677691746f9aecb33d2c5a716aa75f280249590f314249f0c28ec9a428b011ccf59af9575c414629391e003cba6cc2b7f5208d1821d2181549336cca90b4ea16addcaec647e5911eed29248fc70a36cb7869f999b153df32df5f09422ded1502a6ce409265cb2", 0xd9}, {&(0x7f0000000800)="2cee0b97331419881e2a8f753cba323466074ebe3f97cee4a3cd3589709748d7b816e29f421da12410da11cfb10bccb0ea3e51b596153f1363d4c0383a67f2d1bdf458889d5f7d9f3c4fa72fe6abaefbfb51a35744879f2a15e94a609158993fbfb0632515d8d392e6c053850c", 0x6d}, {&(0x7f0000000880)="31039b4d2a264c04b2394e1069918ed13d5b7b1dfd0f34599b965bee5729c1aa3f45b480", 0x24}, {&(0x7f00000008c0)="269f74e805768e6ada38347cd2086c698bdde0876a22e579c779cd0b96c961093d443320755ca3eed8030c83300525bc202ffbd212233121f715da767cb655a8004d69c6d07da8fe5cd061984b4e9d3512c0ede30ae9ec1e0af317eec49fa851536621b9243da85778974fbe6780797baa713650d8fd1e3ef61380cd61603e1495acff406d1d4ed56fc4f579edf65087ff3bfffde45f0fbc917d", 0x9a}, {&(0x7f0000000980)="3bab83f28b044d88052b0b1c5d0ea9f5bd16dae875a6f488e0a525820989641e075cc62aa81f3056148c5f2ed6b1ed6498eaeb6ccd4d2a55dfa04d519b0ec102bf84a6463c3fac716394a963a1e3dd8027004a1af1fed2b9cf6ca4ca1414a71cc5ba325d8b83aae10cb9a2304357444035e265f475b01c66c2812db38401003385bd0b4628c984750ce506b3ed442408d1b1aac6318630c93cbfa001e46fd1f6d3b3eb8a4b8a8c5f31e13fe2bd606624c04b2cc1fb9cfc4c4717493b79f28dfeb924149e2907e692d51dbfe3b10ac164b620cde7e35a35ddc349d04413d9dbbf8450d22a3fe7fa643b91af1efade27998cdf901c", 0xf4}, {&(0x7f0000000a80)="61ef72e10b3c6d00c78f602e52eb9f7d57f64de14ed9795a6c61f23223", 0x1d}], 0x8, 0x0, 0x0, 0x44080}, 0x805) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000c40)=0xc00, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000d00)={0x12, 0x10, 0xfa00, {&(0x7f0000000cc0), 0xffffffffffffffff, r1}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000d40)={0x6, 0x118, 0xfa00, {{0x3ff, 0x8, "38b789924e2e1eb65dff8097995bcb91de5c5f8dce06080d8621a778e488f38b7f2872e0b8cc5b72cc35e4a273dbb2f1826ff5c5956a22aff27eb17108774fe439b1bca08bc6c05d111b04cf9181b222d4509609e0e54170012512fa1e965d88c5f9705bdeef34e0dd862e009a0aeeceb26cd5b94e65c472ee40cfa967431457d566c83dfa15b3469844454c5832d4abb84c6fe86df4c192f5f5417400c4e5ea25d23e7681d647b691e495a5b3bbe6b684bcaf13657d84660a8e36e636aaa9b9f5ef3172e8afa25334bb6dd71389874da3a24be8578a704f8954e33b17b2474447eb238ba4a0426c018edd89c71decea8b4f6f4b4673b340dac90816f04e0dad", 0x1, 0x85, 0x1, 0x0, 0x58, 0x9, 0x1f, 0x1}}}, 0x120) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000e80)) r5 = syz_open_dev$loop(&(0x7f0000000ec0)='/dev/loop#\x00', 0x9, 0x201) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000f00)={0x1, 0x4, 0xfffffffe, 0x328}) 09:50:20 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001d40)={0x9, {{0xa, 0x4e24, 0x10000, @mcast1}}, 0x0, 0x8, [{{0xa, 0x3ff, 0x5, @empty, 0x40}}, {{0xa, 0x4e21, 0x1c0, @private0={0xfc, 0x0, [], 0x1}, 0x3}}, {{0xa, 0x4e20, 0x4a8, @local, 0x563}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x7fff}}, {{0xa, 0x4e20, 0x3ff, @local, 0x3da}}, {{0xa, 0x4e21, 0x80000001, @private1={0xfc, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @empty, 0x101}}]}, 0x490) socket$inet_tcp(0x2, 0x1, 0x0) 09:50:20 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "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", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x80000000) 09:50:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r5}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) 09:50:20 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) 09:50:20 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000006900)) socket$inet6(0xa, 0x1, 0x5) 09:50:20 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001d40)={0x9, {{0xa, 0x4e24, 0x10000, @mcast1}}, 0x0, 0x8, [{{0xa, 0x3ff, 0x5, @empty, 0x40}}, {{0xa, 0x4e21, 0x1c0, @private0={0xfc, 0x0, [], 0x1}, 0x3}}, {{0xa, 0x4e20, 0x4a8, @local, 0x563}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x7fff}}, {{0xa, 0x4e20, 0x3ff, @local, 0x3da}}, {{0xa, 0x4e21, 0x80000001, @private1={0xfc, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @empty, 0x101}}]}, 0x490) socket$inet_tcp(0x2, 0x1, 0x0) 09:50:20 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "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", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4, 0xfa00, {r3}}, 0xc) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x80000000) 09:50:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r5}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) 09:50:20 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0xe, 0x1, 0x5, 0x39, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@local, 0xf, 0x0, 0x14}, @sadb_x_filter={0x5, 0x1a, @in=@broadcast, @in=@multicast1, 0x26, 0x32, 0x2}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_x_sec_ctx={0x16, 0x18, 0xfb, 0x1, 0xa1, "fb79bcef06456f05ba573fe7c3694df8a9826e6c51b90058740312734a95cb0aa219a0f3d8025ec119f407fa4693c5d57e7ad19dcdcfe851fe836ebe6e36c6dde2ee6efedd1e288a1da1137a61b03aae0168ab0b9ccf5b10a65ec6a0d3b2bd229734d3e91e8bddd81d89717f7e98a4a9815f238b97ca8f94149c63bc86aa077051ba61adc30d3c434c020c84eb423581443e1b4e8cdd5d918ff13688d006fea616"}, @sadb_x_sec_ctx={0x15, 0x18, 0x4, 0x0, 0x9c, "4cd30d8c134e2b75c71e06adffcd153b2c08c6253ee45d869057530ed622aa0dd08151c3852f1e9312dc76349b550f814e218d40838a6e34bec30e7abf7461b279ca057d3847cbdc6c2e213ea1ffbe517e87cc664fd88af91dec6a00ed9d6db47b39e81c97994d4d4dc82224c8262dec4f0e705e38518bbd9ba8cab358a0ef237bd95aba103b87c671917515473b974868a802ed17a770ee138b81c1"}]}, 0x1c8}}, 0x2) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x0, 0x20, 0x2, @private1, @ipv4={[], [], @private=0xa010100}, 0x700, 0x0, 0xd9, 0x3}}) socket$inet(0x2, 0x80000, 0x9) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@private2={0xfc, 0x2, [], 0x1}, r0}, 0x14) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x460444, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000003c0)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x3a}, 0x4, 0x1, 0xff, 0x8, 0x6}, &(0x7f0000000440)=0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x189000, 0x0) sendmsg$xdp(r3, &(0x7f0000000b40)={&(0x7f00000004c0)={0x2c, 0x3, r0, 0x40}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000500)="b64709555e3c0ba3ac821a901a7cdd0232ccdbbb0d22296318336dff563ff1591a1e39483521ca7cf77af04374ba65ac23ec1e60c51892566b036f5ed3ccc34e9bc9b77e85915b0b4e8eb2877407a3d68d3e400092512f8cc8c9c35e8650327e07b541676875c5edee27d804d503bc31653d3e07d3eca1fc33cdabb814b251bed5e218267648d325909982e20a3f45fce9995890fb4fe9dbdb342168b85d492020de46e2b69968a9876110ca7582d329121c6a7c5acd6ce8c76d40486fb0389c91abd6c93093c69da3ec3185ee35c6fa5692c85b", 0xd4}, {&(0x7f0000000600)="09f34097f75eb0dc06fbb466776f232836ad94a608647f1fec16bc1f9e9081477f4fccda20e9ee7924a050d64c3d9d5f1dbe6383fa72b010897d81fa61f54d5f877c073c2bcca1434f93a7e222f6a56b920c1b2184a6c72e05e49cdf811f88286a634ba15f2a45a2a72a7f055147b2a16b1fe2a553df56c90aff7c24e115dea8111b3c8f8e719e3811ef30575b2faed69e2448a531b2129c68665166f47376367a0050ad236ba40780c5a861431fc8a76abd9038cb70c67ebf66ac09e3e1aee4a5b480dab69cc141a663cda237410a7f0ef5b85b4e109f996fce73a959eb1dde881239", 0xe3}, {&(0x7f0000000700)="e4dad524cded4b996bbe03123b43d64ba1a8bc232831e713851e61796e9918fe8bb590bd594e10a87dbd0b9e48aac8cbb7b2b49fdd9deba3eda2c3213926cb56fc3ae848bcf442fca8c763fc120c6cc573a3aec5cd2b5a918c1ebd0ec0c64a8bae4494d719fa4f9285769aa13c1d222b656dd677691746f9aecb33d2c5a716aa75f280249590f314249f0c28ec9a428b011ccf59af9575c414629391e003cba6cc2b7f5208d1821d2181549336cca90b4ea16addcaec647e5911eed29248fc70a36cb7869f999b153df32df5f09422ded1502a6ce409265cb2", 0xd9}, {&(0x7f0000000800)="2cee0b97331419881e2a8f753cba323466074ebe3f97cee4a3cd3589709748d7b816e29f421da12410da11cfb10bccb0ea3e51b596153f1363d4c0383a67f2d1bdf458889d5f7d9f3c4fa72fe6abaefbfb51a35744879f2a15e94a609158993fbfb0632515d8d392e6c053850c", 0x6d}, {&(0x7f0000000880)="31039b4d2a264c04b2394e1069918ed13d5b7b1dfd0f34599b965bee5729c1aa3f45b480", 0x24}, {&(0x7f00000008c0)="269f74e805768e6ada38347cd2086c698bdde0876a22e579c779cd0b96c961093d443320755ca3eed8030c83300525bc202ffbd212233121f715da767cb655a8004d69c6d07da8fe5cd061984b4e9d3512c0ede30ae9ec1e0af317eec49fa851536621b9243da85778974fbe6780797baa713650d8fd1e3ef61380cd61603e1495acff406d1d4ed56fc4f579edf65087ff3bfffde45f0fbc917d", 0x9a}, {&(0x7f0000000980)="3bab83f28b044d88052b0b1c5d0ea9f5bd16dae875a6f488e0a525820989641e075cc62aa81f3056148c5f2ed6b1ed6498eaeb6ccd4d2a55dfa04d519b0ec102bf84a6463c3fac716394a963a1e3dd8027004a1af1fed2b9cf6ca4ca1414a71cc5ba325d8b83aae10cb9a2304357444035e265f475b01c66c2812db38401003385bd0b4628c984750ce506b3ed442408d1b1aac6318630c93cbfa001e46fd1f6d3b3eb8a4b8a8c5f31e13fe2bd606624c04b2cc1fb9cfc4c4717493b79f28dfeb924149e2907e692d51dbfe3b10ac164b620cde7e35a35ddc349d04413d9dbbf8450d22a3fe7fa643b91af1efade27998cdf901c", 0xf4}, {&(0x7f0000000a80)="61ef72e10b3c6d00c78f602e52eb9f7d57f64de14ed9795a6c61f23223", 0x1d}], 0x8, 0x0, 0x0, 0x44080}, 0x805) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000c40)=0xc00, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000d00)={0x12, 0x10, 0xfa00, {&(0x7f0000000cc0), 0xffffffffffffffff, r1}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000d40)={0x6, 0x118, 0xfa00, {{0x3ff, 0x8, "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", 0x1, 0x85, 0x1, 0x0, 0x58, 0x9, 0x1f, 0x1}}}, 0x120) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000e80)) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000f00)={0x1, 0x4, 0xfffffffe, 0x328}) 09:50:20 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) 09:50:20 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001d40)={0x9, {{0xa, 0x4e24, 0x10000, @mcast1}}, 0x0, 0x8, [{{0xa, 0x3ff, 0x5, @empty, 0x40}}, {{0xa, 0x4e21, 0x1c0, @private0={0xfc, 0x0, [], 0x1}, 0x3}}, {{0xa, 0x4e20, 0x4a8, @local, 0x563}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast2}, 0x7fff}}, {{0xa, 0x4e20, 0x3ff, @local, 0x3da}}, {{0xa, 0x4e21, 0x80000001, @private1={0xfc, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @empty, 0x101}}]}, 0x490) socket$inet_tcp(0x2, 0x1, 0x0) 09:50:20 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "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", 0xfd, 0x84, 0x5d, 0x4, 0x2, 0x3f, 0x7}, r0}}, 0x128) r1 = socket(0xa, 0xa, 0xe0000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000340), &(0x7f0000000380)=0x4) bind$phonet(r1, &(0x7f00000003c0)={0x23, 0x3f, 0x81, 0x80}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x74b1, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @ib={0x1b, 0xe8, 0x80, {"5a4d11f44bd6b35d49759b80f139bf12"}, 0x8, 0x1ff, 0x5}}}, 0x118) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x40000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x8, r0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0), 0x13f, 0x5}}, 0x20) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x10010, 0xffffffffffffffff, 0x80000000) 09:50:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r4}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) 09:50:20 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r4, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) 09:50:20 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x80, @private1={0xfc, 0x1, [], 0x1}, 0x4}, {0xa, 0x4e23, 0xa94, @private0={0xfc, 0x0, [], 0x1}, 0x4}, 0x90a, [0x0, 0x800, 0x4, 0x4, 0x98bf, 0x3ff, 0x0, 0xff]}, 0x5c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/126, 0x7e}, {&(0x7f0000001440)=""/173, 0xad}], 0x7}, 0x140) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x10, 0x3f6, 0x300, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, &(0x7f00000016c0)="0691cb2854e42277f0b7e042b4209ea61c46f3ee24e169410a3ceb15b218a0930f4349f532dd796a1466f214c18de2703ee57861eaeee8d4c7b391261215180351c1555d86c3dd5085d66be2704e2eaa8eef", &(0x7f0000001740)=@tcp, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000017c0)=@assoc_value, &(0x7f0000001800)=0x8) epoll_create(0xffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000001880), &(0x7f00000018c0)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x30) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x10, 0x3f5, 0x10, 0x70bd27, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44040}, 0x880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001ac0)) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000001b00)=0x400, 0x4) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001cc0)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x140010}, 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0xd8, 0x453, 0x100, 0x70bd2a, 0x25dfdbff, "0eafdd2614d7938aa9fd82c59baae32091c06fb4e3880d113f12f429c032ce4342119b18d7c49ad15fcbb739cfac9a6b9420e814756866dbadc6451e05b9da2937d31e904f313c4862790a01996a499d7ec85d6f03cf5d802e512d01ac84dd4f6799ba673ffbf5771d57b51580ef0bf898b1ae310e8ed6a768ced0ad46ed485490f97e0e3f766f985cab514497f7990de4cc7be32c68f18cb16560f6a2c3e26f9ba6f7d3383bd48627b1e5b6776fc9e2956e7d08f6281d845bf68c56bfe44c8adbc9ff9270", ["", "", "", "", "", ""]}, 0xd8}, 0x1, 0x0, 0x0, 0x7db2a7adef768211}, 0x20008000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001d00)=0x7, 0x4) epoll_create(0x2) socket$inet_tcp(0x2, 0x1, 0x0) 09:50:21 executing program 0: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x1}, 0x8}}}, 0x38) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x56, 0x202242) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x10001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x20, &(0x7f0000000180)={[0x5]}, 0x8) r1 = socket$inet(0x2, 0x800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002cc0)={{{@in6=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000002dc0)=0xe8) sendmsg$xdp(r2, &(0x7f0000003240)={&(0x7f0000002e00)={0x2c, 0x2, r3, 0x40}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002e40)="2997d6130abbd628f5779c4940a697cd00426f03f2ab98a2058f5c5668a589ba8584535e5ece5adceb55a25cbc0cf5b857b1e97f20878f6b8742b48bf966d3a48a60debfc0b8f466d5e2351390e4cd94d21660ee9137d4e6f8fa02ea6fa212f3ce99c04fd5f1004dac9165ec1a1ab761130f", 0x72}, {&(0x7f0000002ec0)="5517712d9a55b2da9c42", 0xa}, {&(0x7f0000002f00)="7b6e19e1f5d9df713beee14fd311aba81dd1b5e3d475b2b44cf01467f6ef1173715ef1a638cb6d65672cdd4bfebb31d0ba08e506f15c1fbcd78fd43f854ae00462c6b2a3f3298c80a9d9609ed91e8876ad40dd0e31147e57df0aa68901a3c05484aa4e4ac22491c2c56115579d0fb9585397fa74d0b7cec6c12d61860ef4b98d4ec94d58ca53cdccedd50f9cb9d52b5ff95daad6c0744d36f27d5fa1c8b70822af43329a7ff955281cc3c8d7f39b549876b0c26364fb4aa7ddaf55b95196354a70b2ad9cda", 0xc5}, {&(0x7f0000003000)="2fb87b0c73a6abe2d47252c94f5a6a2cb3f862b66107b70e1e223c7302738dbcfcd82b3bfa0133467719c9ac5931af38379e19d6206e0696b629d0bf38ff888bba09c4bf21d9f7e356802b69d805ad918de8f71f280b47a29626a001f7", 0x5d}, {&(0x7f0000003080)="067a9fe5316551b9d0dab3817848bc07d8ba6ffa821f3d10812e256146f4b6a3fb03749f5b6a06c414cb96b93a319b7e1281a2aca6988a1ba22a6fbc7e53ab4838b48871852648d93caa9b17dc4795edd7409bb9c94e7959e793acb8b9076862d05b33871f8076dac2fd8daff6db6302aa1960abdacf9c21b59b58320df11d407915cde5f40a496fab62", 0x8a}, {&(0x7f0000003140)="2193555f00d0ef764aa4aa24c636e254d719b940e20ffb387292888a4e24fefd652eab5c124fb57f9c3d81f6df2d28f245d20776f49ff9846149261111cdd5150802ea12657eb5f67f8686a4d5e8248944865294f4ab0f8f771ff016d7b0602bc042", 0x62}], 0x6, 0x0, 0x0, 0x8880}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000068c0)='/dev/full\x00', 0x107840, 0x0) socket$inet6(0xa, 0x1, 0x5) 09:50:21 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="dc08dbfa36d6ef84f320e0a2ca39bb15b52ef4bd7253ce85887c03ceb9703256b2043513a6f1ffad37de1ee4c4a219616174759d7e370b5af488fe610233a9df9d3990453fec197679db16fda76f661484bcd9e929fb90c901f8", &(0x7f0000000080)=@udp, 0x1}, 0x20) r0 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x20, 0x4000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x4040, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/95, 0x5f}], 0x3, &(0x7f0000000440)=""/52, 0x34}, 0x10000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000004c0)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000640)={@private1, r4}, 0x14) socket(0x6, 0x80000, 0xcd) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000680)={@ipv4={[], [], @private=0xa010102}}, 0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000006c0)=0x200000, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x101140, 0x0) 09:50:21 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0xe, 0x1, 0x5, 0x39, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@local, 0xf, 0x0, 0x14}, @sadb_x_filter={0x5, 0x1a, @in=@broadcast, @in=@multicast1, 0x26, 0x32, 0x2}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d4}, @sadb_x_sec_ctx={0x16, 0x18, 0xfb, 0x1, 0xa1, "fb79bcef06456f05ba573fe7c3694df8a9826e6c51b90058740312734a95cb0aa219a0f3d8025ec119f407fa4693c5d57e7ad19dcdcfe851fe836ebe6e36c6dde2ee6efedd1e288a1da1137a61b03aae0168ab0b9ccf5b10a65ec6a0d3b2bd229734d3e91e8bddd81d89717f7e98a4a9815f238b97ca8f94149c63bc86aa077051ba61adc30d3c434c020c84eb423581443e1b4e8cdd5d918ff13688d006fea616"}, @sadb_x_sec_ctx={0x15, 0x18, 0x4, 0x0, 0x9c, "4cd30d8c134e2b75c71e06adffcd153b2c08c6253ee45d869057530ed622aa0dd08151c3852f1e9312dc76349b550f814e218d40838a6e34bec30e7abf7461b279ca057d3847cbdc6c2e213ea1ffbe517e87cc664fd88af91dec6a00ed9d6db47b39e81c97994d4d4dc82224c8262dec4f0e705e38518bbd9ba8cab358a0ef237bd95aba103b87c671917515473b974868a802ed17a770ee138b81c1"}]}, 0x1c8}}, 0x2) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x0, 0x20, 0x2, @private1, @ipv4={[], [], @private=0xa010100}, 0x700, 0x0, 0xd9, 0x3}}) socket$inet(0x2, 0x80000, 0x9) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@private2={0xfc, 0x2, [], 0x1}, r0}, 0x14) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x460444, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000003c0)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x3a}, 0x4, 0x1, 0xff, 0x8, 0x6}, &(0x7f0000000440)=0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x189000, 0x0) sendmsg$xdp(r3, &(0x7f0000000b40)={&(0x7f00000004c0)={0x2c, 0x3, r0, 0x40}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000500)="b64709555e3c0ba3ac821a901a7cdd0232ccdbbb0d22296318336dff563ff1591a1e39483521ca7cf77af04374ba65ac23ec1e60c51892566b036f5ed3ccc34e9bc9b77e85915b0b4e8eb2877407a3d68d3e400092512f8cc8c9c35e8650327e07b541676875c5edee27d804d503bc31653d3e07d3eca1fc33cdabb814b251bed5e218267648d325909982e20a3f45fce9995890fb4fe9dbdb342168b85d492020de46e2b69968a9876110ca7582d329121c6a7c5acd6ce8c76d40486fb0389c91abd6c93093c69da3ec3185ee35c6fa5692c85b", 0xd4}, {&(0x7f0000000600)="09f34097f75eb0dc06fbb466776f232836ad94a608647f1fec16bc1f9e9081477f4fccda20e9ee7924a050d64c3d9d5f1dbe6383fa72b010897d81fa61f54d5f877c073c2bcca1434f93a7e222f6a56b920c1b2184a6c72e05e49cdf811f88286a634ba15f2a45a2a72a7f055147b2a16b1fe2a553df56c90aff7c24e115dea8111b3c8f8e719e3811ef30575b2faed69e2448a531b2129c68665166f47376367a0050ad236ba40780c5a861431fc8a76abd9038cb70c67ebf66ac09e3e1aee4a5b480dab69cc141a663cda237410a7f0ef5b85b4e109f996fce73a959eb1dde881239", 0xe3}, {&(0x7f0000000700)="e4dad524cded4b996bbe03123b43d64ba1a8bc232831e713851e61796e9918fe8bb590bd594e10a87dbd0b9e48aac8cbb7b2b49fdd9deba3eda2c3213926cb56fc3ae848bcf442fca8c763fc120c6cc573a3aec5cd2b5a918c1ebd0ec0c64a8bae4494d719fa4f9285769aa13c1d222b656dd677691746f9aecb33d2c5a716aa75f280249590f314249f0c28ec9a428b011ccf59af9575c414629391e003cba6cc2b7f5208d1821d2181549336cca90b4ea16addcaec647e5911eed29248fc70a36cb7869f999b153df32df5f09422ded1502a6ce409265cb2", 0xd9}, {&(0x7f0000000800)="2cee0b97331419881e2a8f753cba323466074ebe3f97cee4a3cd3589709748d7b816e29f421da12410da11cfb10bccb0ea3e51b596153f1363d4c0383a67f2d1bdf458889d5f7d9f3c4fa72fe6abaefbfb51a35744879f2a15e94a609158993fbfb0632515d8d392e6c053850c", 0x6d}, {&(0x7f0000000880)="31039b4d2a264c04b2394e1069918ed13d5b7b1dfd0f34599b965bee5729c1aa3f45b480", 0x24}, {&(0x7f00000008c0)="269f74e805768e6ada38347cd2086c698bdde0876a22e579c779cd0b96c961093d443320755ca3eed8030c83300525bc202ffbd212233121f715da767cb655a8004d69c6d07da8fe5cd061984b4e9d3512c0ede30ae9ec1e0af317eec49fa851536621b9243da85778974fbe6780797baa713650d8fd1e3ef61380cd61603e1495acff406d1d4ed56fc4f579edf65087ff3bfffde45f0fbc917d", 0x9a}, {&(0x7f0000000980)="3bab83f28b044d88052b0b1c5d0ea9f5bd16dae875a6f488e0a525820989641e075cc62aa81f3056148c5f2ed6b1ed6498eaeb6ccd4d2a55dfa04d519b0ec102bf84a6463c3fac716394a963a1e3dd8027004a1af1fed2b9cf6ca4ca1414a71cc5ba325d8b83aae10cb9a2304357444035e265f475b01c66c2812db38401003385bd0b4628c984750ce506b3ed442408d1b1aac6318630c93cbfa001e46fd1f6d3b3eb8a4b8a8c5f31e13fe2bd606624c04b2cc1fb9cfc4c4717493b79f28dfeb924149e2907e692d51dbfe3b10ac164b620cde7e35a35ddc349d04413d9dbbf8450d22a3fe7fa643b91af1efade27998cdf901c", 0xf4}, {&(0x7f0000000a80)="61ef72e10b3c6d00c78f602e52eb9f7d57f64de14ed9795a6c61f23223", 0x1d}], 0x8, 0x0, 0x0, 0x44080}, 0x805) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000c40)=0xc00, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000d00)={0x12, 0x10, 0xfa00, {&(0x7f0000000cc0), 0xffffffffffffffff, r1}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000d40)={0x6, 0x118, 0xfa00, {{0x3ff, 0x8, "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", 0x1, 0x85, 0x1, 0x0, 0x58, 0x9, 0x1f, 0x1}}}, 0x120) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000e80)) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000f00)={0x1, 0x4, 0xfffffffe, 0x328}) 09:50:21 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x7800, 0x10, 0x3, 0x8}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = epoll_create(0x8) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x8, &(0x7f00000001c0)={[0x6]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r0, 0x29, 0x0, 0x4, 0x9, 0x24, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x39}, 0x7, 0x7, 0x1, 0x1}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000300)) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000380)={0x6, 'syz0\x00'}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="03c5f61981b8c4df9270d5fa4a05e8c624f33004af929c0f5899ca50355c710f9327e036951862c0e7721fdae05ed6eb9b7f3af8358a06ebe8ddcc06ca1dae6a0b597edf3484e78bc21b0bd30a3083e45ad390f5310a70a9f90ed370f165b66927ae5faa92501b5491c0730a4ce54157336286caccb0d12120020321dc87fca9768421c2851ca7c123a496cbb23a3a57f06992613ec4a17dd44728f8a3fcb278e92103d6321bf42572f737e7e9735057962380", 0xb3) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)={0x424, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfd, {0x6, 0x0, 0x1a, [0x80000001, 0x5ec, 0xfffffffb, 0x1000, 0x0, 0x6, 0x4, 0x8000, 0x1, 0x4, 0x9782, 0x8, 0x7, 0xfffffff7, 0x5, 0x133, 0x3, 0x8, 0x7, 0x7, 0x8, 0xffffa1d5, 0x1, 0x2, 0xfffffffb, 0x80000000, 0x33, 0x6, 0x7f, 0x0, 0x1, 0x200, 0x0, 0x8, 0x1, 0x24feb2bb, 0x571, 0x4, 0x9, 0x0, 0x6, 0x6, 0x3f, 0x68, 0x1, 0xaf2, 0xffff, 0x66, 0x7ff, 0x1f, 0x5, 0x4, 0x3, 0x5, 0x6, 0x1, 0xfd, 0x3ff, 0x2, 0x8000, 0xffff, 0x100, 0x9, 0x80000000], [0xffffffff, 0x8, 0x20, 0x10000, 0x0, 0x4, 0xb0, 0x401, 0x1, 0x7f, 0x10001, 0x80000000, 0x100, 0x3, 0x8, 0x20000000, 0xb4, 0x8, 0x6, 0x7, 0x4, 0xf09, 0x0, 0x7, 0x3, 0x0, 0x81, 0xed, 0x0, 0x1, 0x4, 0x3, 0x10c567cb, 0x2, 0x4, 0x284, 0x4, 0x80, 0x3, 0x4d, 0x89, 0xfff, 0x1, 0x8, 0x4, 0x5d, 0x4, 0x7f0, 0x100, 0x401, 0xd6bc, 0x1f, 0x6, 0x3, 0x5, 0x2000000, 0x4a6b, 0x0, 0x5, 0x81, 0xfff, 0xee, 0x400, 0x3ff], [0x6, 0x800, 0x2, 0x2, 0x8, 0x7, 0x7fffffff, 0x5, 0x6, 0xffffffff, 0xffff7fff, 0x1, 0xc6, 0x400, 0x12dd, 0x0, 0x3, 0x4, 0xc97, 0x652c8a2, 0x0, 0x6, 0xfff, 0x7, 0x7392, 0x8, 0x1ff, 0x6, 0x8, 0x97f9, 0x401, 0x6, 0x1000, 0x9, 0x9, 0x3ff, 0x9, 0x1, 0xb9, 0x9e, 0x0, 0xad28, 0x80000000, 0x9000, 0x0, 0x9, 0x9, 0x7, 0x7, 0x1ff, 0x5, 0x2, 0x18ef, 0x7a73, 0x5, 0x6, 0x4, 0x80, 0x8001, 0x3ff, 0x2b, 0x9, 0x8, 0x10001], [0x6, 0xa7b, 0x5, 0x4d5, 0x6, 0x100, 0x9, 0xffff, 0x9, 0x7fff, 0x401, 0x7, 0xa06c, 0xcb, 0x8, 0x10001, 0xb57a, 0x4ef, 0xfffff801, 0x3, 0x4, 0x2, 0x7, 0x7fff, 0x3ff, 0x67b00cc5, 0x3f, 0x10, 0x7, 0x4, 0x6, 0x6, 0x1, 0xfffffffc, 0x9, 0x7, 0x3, 0x1, 0x7, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x1ff, 0x1, 0x4, 0x7, 0x5, 0x23103ca7, 0x5, 0x274, 0x6, 0x8, 0x1, 0xffffffff, 0x66e, 0x3, 0x8, 0x4, 0x1, 0x925e, 0x4, 0x7, 0x216], 0x4, ['@$-\x00']}, ["", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x44840}, 0x8001) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000a40)={0x0, &(0x7f0000000980)=""/130}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x20600, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) epoll_pwait(0xffffffffffffffff, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2, &(0x7f0000000b40)={[0x7]}, 0x8) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b80), 0xffffffffffffffff, 0x2}}, 0x18) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x10, 0x3f5, 0x2, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000810) 09:50:21 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r0, 0x1c, 0x1, @in={0x2, 0x4e23, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x2, "aa93a12e4f72aaac2974c93df23a22378e0964e05496de23a081bc0efbacd67d1f58c89343a096f41a7c0d9ca0fbb0a9d046b9c819db7a84a75f49ab38480171d34c49560644ec9d1388b9ff189692a013c8000e8de7275442af280540483a941ccb8d00b14e95295a3964762e36dca7ffb94cf500827363ed4c44f8fec43948deee030e3bda7df04480fa53c2aef850349e22a9ee7314920e1f7183fe1d8ce223ecb8c0f1612678d3bcd1aba1