, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700), 0x106, 0x9}}, 0x20) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700), 0x106, 0x9}}, 0x20) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700), 0x106, 0x9}}, 0x20) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r3}}, 0x18) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r3}}, 0x18) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @remote}}}, 0xa0) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:05 executing program 0: accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a80)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x2, {0xa, 0x4e20, 0x754a89ac, @mcast1, 0x5}, r8}}, 0x38) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 0: accept4$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x80000) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a80)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x2, {0xa, 0x4e20, 0x754a89ac, @mcast1, 0x5}, r8}}, 0x38) 00:27:05 executing program 0: accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x80000) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a80)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x2, {0xa, 0x4e20, 0x754a89ac, @mcast1, 0x5}, r8}}, 0x38) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:05 executing program 0: accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980), 0x2, 0x1}}, 0x20) 00:27:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) 00:27:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700), 0x106, 0x9}}, 0x20) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) 00:27:06 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r3}}, 0x18) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:06 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:06 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 00:27:06 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x17, 0x8}}, 0x20) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x8}}, 0x20) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a80)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x2, {0xa, 0x4e20, 0x754a89ac, @mcast1, 0x5}, r8}}, 0x38) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a80)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x2, {0xa, 0x4e20, 0x754a89ac, @mcast1, 0x5}, r8}}, 0x38) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a80)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x2, {0xa, 0x4e20, 0x754a89ac, @mcast1, 0x5}, r8}}, 0x38) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a80)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x2, {0xa, 0x4e20, 0x754a89ac, @mcast1, 0x5}, r8}}, 0x38) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000a00)={0xb, 0x10, 0xfa00, {&(0x7f00000008c0), r8, 0x6000}}, 0x18) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000009c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000980), 0x2, 0x1}}, 0x20) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r7}, 0x10) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000840), 0x505080, 0x0) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x0, 0x5}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 3: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:06 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000780)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x100, 0x7fffffff, {"aff821275ea7993acacbea7480c98835"}, 0x3, 0x3, 0x2}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}}}}, 0x90) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700), 0x106, 0x9}}, 0x20) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x3, r4, 0x30, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f00000005c0)) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x10, 0x80000) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x17, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r3}}, 0x18) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x13f}}, 0x20) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x0, 0x5}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) 00:27:07 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x7ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x17, 0x8}}, 0x20) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}}}}, 0x90) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, r0}}, 0x38) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) 00:27:07 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) 00:27:07 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xc94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x57e}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20008080) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (fail_nth: 1) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x24, 0x0, 0x200, 0x4, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xfff}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x0) [ 63.721066][T10035] FAULT_INJECTION: forcing a failure. [ 63.721066][T10035] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 63.734162][T10035] CPU: 0 PID: 10035 Comm: syz-executor.2 Not tainted 5.16.0-rc8-syzkaller #0 [ 63.742928][T10035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.753039][T10035] Call Trace: [ 63.756319][T10035] [ 63.759248][T10035] dump_stack_lvl+0xd6/0x122 [ 63.763905][T10035] dump_stack+0x11/0x1b 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) [ 63.768145][T10035] should_fail+0x23c/0x250 [ 63.772604][T10035] should_fail_usercopy+0x16/0x20 [ 63.777642][T10035] _copy_to_user+0x1c/0x90 [ 63.782166][T10035] simple_read_from_buffer+0xab/0x120 [ 63.787622][T10035] proc_fail_nth_read+0x10d/0x150 [ 63.792747][T10035] ? proc_fault_inject_write+0x230/0x230 [ 63.798386][T10035] vfs_read+0x1e6/0x750 [ 63.802548][T10035] ? __fget_files+0x1d2/0x210 [ 63.807297][T10035] ksys_read+0xd9/0x190 [ 63.811549][T10035] __x64_sys_read+0x3e/0x50 [ 63.816121][T10035] do_syscall_64+0x44/0xd0 [ 63.820619][T10035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 63.826696][T10035] RIP: 0033:0x7f57e98e2a4c [ 63.831212][T10035] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 63.850842][T10035] RSP: 002b:00007f57e8aa6160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 63.859323][T10035] RAX: ffffffffffffffda RBX: 00007f57e9a42f60 RCX: 00007f57e98e2a4c 00:27:07 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) 00:27:07 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00'}) 00:27:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) 00:27:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) [ 63.867344][T10035] RDX: 000000000000000f RSI: 00007f57e8aa61e0 RDI: 0000000000000003 [ 63.875310][T10035] RBP: 00007f57e8aa61d0 R08: 0000000000000000 R09: 0000000000000000 [ 63.883279][T10035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.891293][T10035] R13: 00007ffd86a7042f R14: 00007f57e8aa6300 R15: 0000000000022000 [ 63.899266][T10035] 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 00:27:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) 00:27:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) 00:27:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) (async) 00:27:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) 00:27:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) 00:27:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0x2}}, 0x20) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) 00:27:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0x2}}, 0x20) 00:27:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x9, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) 00:27:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0x2}}, 0x20) (async) 00:27:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x4, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000080)={{r1}, 0x0, 0x1c, @inherit={0x68, &(0x7f0000000000)={0x0, 0x4, 0x100, 0x8, {0x36, 0x54, 0x3, 0x7, 0x7c3}, [0x1f, 0x1ff, 0x11, 0x1000]}}, @subvolid=0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x0, 0x5}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) 00:27:08 executing program 0: openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x100000001, 0x5}}}, 0x90) 00:27:08 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000080)={{r1}, 0x0, 0x1c, @inherit={0x68, &(0x7f0000000000)={0x0, 0x4, 0x100, 0x8, {0x36, 0x54, 0x3, 0x7, 0x7c3}, [0x1f, 0x1ff, 0x11, 0x1000]}}, @subvolid=0x7}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 0: openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00'}) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}, 0x0, 0x0, 0x5}}}, 0x90) 00:27:08 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00'}) 00:27:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) 00:27:08 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000080)={{r1}, 0x0, 0x1c, @inherit={0x68, &(0x7f0000000000)={0x0, 0x4, 0x100, 0x8, {0x36, 0x54, 0x3, 0x7, 0x7c3}, [0x1f, 0x1ff, 0x11, 0x1000]}}, @subvolid=0x7}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 00:27:08 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"a8f439d099d8ad7c1cbbcfbc0bdf891e"}}}}, 0x90) 00:27:08 executing program 2: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 2: epoll_create(0x80) (async) socket$caif_seqpacket(0x25, 0x5, 0x5) (async) r0 = epoll_create1(0x80000) (async, rerun: 32) epoll_create(0x1ff) (async, rerun: 32) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) socket$nl_generic(0x10, 0x3, 0x10) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) socket$nl_generic(0x10, 0x3, 0x10) 00:27:08 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 00:27:08 executing program 2: epoll_create(0x80) (async) socket$caif_seqpacket(0x25, 0x5, 0x5) (async) r0 = epoll_create1(0x80000) (async) epoll_create(0x1ff) (async, rerun: 64) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (rerun: 64) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async, rerun: 64) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (rerun: 64) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async, rerun: 32) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (rerun: 32) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, 0x0, 0x20040081) 00:27:08 executing program 5: openat$random(0xffffffffffffff9c, 0x0, 0x2000, 0x0) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 5: openat$random(0xffffffffffffff9c, 0x0, 0x2000, 0x0) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, 0x0, 0x20040081) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) 00:27:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) 00:27:08 executing program 5: openat$random(0xffffffffffffff9c, 0x0, 0x2000, 0x0) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, 0x0, 0x20040081) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 3: sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 3: sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, 0x0, 0x84) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) 00:27:08 executing program 4: sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x56, 0x2, "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", 0x1, 0x1, 0xaf, 0x80, 0x1, 0x6, 0x3}}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e23, 0x4, @private0, 0x6}}}, 0x38) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 3: sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x56, 0x2, "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", 0x1, 0x1, 0xaf, 0x80, 0x1, 0x6, 0x3}}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e23, 0x4, @private0, 0x6}}}, 0x38) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 4: sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, 0x0, 0xde95206cf66c905a) 00:27:08 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) 00:27:08 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x56, 0x2, "5d9b0085a7a9b837b1bf84f2471e484e312b498badde2d16b4dad8dc6887185fb2d8816b970242a67c08cc51b9d7eef40e83a774acf35670b0763e8705747ee34d20e70ae502468a30bde9dbc0fb5af9b222bd150ded65b852469a78b5a4759c8962c3bbb26477005bab65452e9bb20656b5f4232cdab43d84cdcd818c2e1df62f11d3e6ee3f0b89246efcc94679f290b226439af6b0ba0614143c444c9065dd084684459688546a6e5cd5e46514ecd0d2d1d8948257defa059d56d3d813a1f1d089a0c0d31c9a08f53f49645e93b30e89d7432b7960fbb40f734b3fd81970dcc45ebdf5407678f8f6ab02b0e538bd6f4b81caec6859f22364e5a367ac2e42bb", 0x1, 0x1, 0xaf, 0x80, 0x1, 0x6, 0x3}}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e23, 0x4, @private0, 0x6}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x56, 0x2, "5d9b0085a7a9b837b1bf84f2471e484e312b498badde2d16b4dad8dc6887185fb2d8816b970242a67c08cc51b9d7eef40e83a774acf35670b0763e8705747ee34d20e70ae502468a30bde9dbc0fb5af9b222bd150ded65b852469a78b5a4759c8962c3bbb26477005bab65452e9bb20656b5f4232cdab43d84cdcd818c2e1df62f11d3e6ee3f0b89246efcc94679f290b226439af6b0ba0614143c444c9065dd084684459688546a6e5cd5e46514ecd0d2d1d8948257defa059d56d3d813a1f1d089a0c0d31c9a08f53f49645e93b30e89d7432b7960fbb40f734b3fd81970dcc45ebdf5407678f8f6ab02b0e538bd6f4b81caec6859f22364e5a367ac2e42bb", 0x1, 0x1, 0xaf, 0x80, 0x1, 0x6, 0x3}}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e23, 0x4, @private0, 0x6}}}, 0x38) (async) 00:27:08 executing program 4: sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 2: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x30000080}, 0x4000840) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) 00:27:08 executing program 4: sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 2: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x30000080}, 0x4000840) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x20040081) 00:27:08 executing program 4: sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:27:08 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 2: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x30000080}, 0x4000840) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x30000080}, 0x4000840) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) 00:27:08 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 00:27:08 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:27:08 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:08 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:27:08 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 00:27:08 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) 00:27:08 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:08 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) (async) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) (async) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) (async) 00:27:09 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 1: epoll_create(0x80) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 00:27:09 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) (async) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) (async) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) (async) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) (async) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) (async) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 1: epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) 00:27:09 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) 00:27:09 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x220, r0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x204, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x427, 0x9, 0x7f, 0x5}, {0xfffa, 0x7f, 0x9, 0x9}, {0x4, 0xf9, 0xff, 0x2}, {0x9baa, 0x5, 0x3f, 0x5}, {0xfff7, 0x6e, 0x6, 0x57a}, {0x5, 0x1f, 0xe9}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4fa}}}]}}]}, 0x220}, 0x1, 0x0, 0x0, 0x8801}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000040)) 00:27:09 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x220, r0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x204, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x427, 0x9, 0x7f, 0x5}, {0xfffa, 0x7f, 0x9, 0x9}, {0x4, 0xf9, 0xff, 0x2}, {0x9baa, 0x5, 0x3f, 0x5}, {0xfff7, 0x6e, 0x6, 0x57a}, {0x5, 0x1f, 0xe9}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4fa}}}]}}]}, 0x220}, 0x1, 0x0, 0x0, 0x8801}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000440)={r4, r5, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r7) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r8, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r7}, 0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x220, r0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x204, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x427, 0x9, 0x7f, 0x5}, {0xfffa, 0x7f, 0x9, 0x9}, {0x4, 0xf9, 0xff, 0x2}, {0x9baa, 0x5, 0x3f, 0x5}, {0xfff7, 0x6e, 0x6, 0x57a}, {0x5, 0x1f, 0xe9}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4fa}}}]}}]}, 0x220}, 0x1, 0x0, 0x0, 0x8801}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x220, r0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x204, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x427, 0x9, 0x7f, 0x5}, {0xfffa, 0x7f, 0x9, 0x9}, {0x4, 0xf9, 0xff, 0x2}, {0x9baa, 0x5, 0x3f, 0x5}, {0xfff7, 0x6e, 0x6, 0x57a}, {0x5, 0x1f, 0xe9}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4fa}}}]}}]}, 0x220}, 0x1, 0x0, 0x0, 0x8801}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 5: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000040)) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) 00:27:09 executing program 5: epoll_create(0x80) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 2: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) (async) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) (async) 00:27:09 executing program 5: epoll_create(0x0) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) 00:27:09 executing program 5: epoll_create(0x0) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) 00:27:09 executing program 2: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) (async) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) (async) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:09 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 5: epoll_create(0x0) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:09 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) 00:27:09 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:09 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:09 executing program 4: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:09 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:09 executing program 3: epoll_create(0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) 00:27:09 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 4: epoll_create(0x80) epoll_create1(0x80000) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:09 executing program 3: epoll_create(0x0) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) (async) 00:27:09 executing program 3: epoll_create(0x0) 00:27:09 executing program 4: epoll_create1(0x80000) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:09 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) (rerun: 64) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 4: epoll_create1(0x0) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={r1, r2, 0x645e8d8d}) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:09 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={r1, 0xffffffffffffffff, 0x645e8d8d}) 00:27:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={r1, 0xffffffffffffffff, 0x645e8d8d}) 00:27:09 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x80) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (rerun: 64) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x80) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x645e8d8d}) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) 00:27:09 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x41, 0x0) 00:27:09 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x645e8d8d}) 00:27:09 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x41, 0x0) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={r1, r2, 0x645e8d8d}) 00:27:09 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={r1, r2, 0x645e8d8d}) 00:27:09 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x41, 0x0) 00:27:09 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x29, 0x2, 0x0, 0x40, 0x40, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x1, 0x7800, 0x7}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x91}, 0x4800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x645e8d8d}) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:09 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) epoll_wait(r4, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:09 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:27:09 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x645e8d8d}) 00:27:09 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:09 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:09 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:09 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x29, 0x2, 0x0, 0x40, 0x40, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x1, 0x7800, 0x7}}) (rerun: 64) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x91}, 0x4800) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:09 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:27:10 executing program 0: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x645e8d8d}) 00:27:10 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xac3, 0x2e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004008}, 0x24000000) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:27:10 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x29, 0x2, 0x0, 0x40, 0x40, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x1, 0x7800, 0x7}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x91}, 0x4800) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:10 executing program 0: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 00:27:10 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r1, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00'}) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000010c0)=@urb_type_bulk={0x3, {0xb}, 0x9, 0x0, &(0x7f0000000000)="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", 0x1000, 0x5, 0x2, 0x10000, 0x4, 0x3, &(0x7f0000001000)="5666b0d6493fef12f5c64a9a30721e3394ff253c6aac9c169e0fd23842e0a529701330931c7cfe524f86395d89928818c1639ccdfadc06406d8efaa40a3dd6f849db40bc8ee47f9f2ed39e185a35772fafb814390cd7a9561c0429b510950bb18f4c2d6c334edf57c2e9439d5b284f1410975742aa3cebe88e2836be1e71e0255a14951cac7c16374226e0a811b3f3"}) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) 00:27:10 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r1, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000010c0)=@urb_type_bulk={0x3, {0xb}, 0x9, 0x0, &(0x7f0000000000)="ac98392a4fe24fdc74f3e0396e57b1ea25474e9538d5bdaa70d1350c263d5311549ae81f70189c0dfa2037aa4da75ef4c393e749811b9085fa0c3f59a298101203d0136eac625f9930d653a2ed0ed16672664a179f3847bbbf75451af7f26d372f965df61da7a12a7af605a028fe9a3ebff67d72388ff8e2f7e157ad8d93db0311ca76697ca5229b64c3db75cdc07079096e1902ba90233f68623ff97eca8b786ee5d552db97625876d3199df9c9922f43629d0512d2c85f212b343f73f4f365c47ee09569812c12efc7ea65949c152e1d417e3730af19febea9bddaffd10b08d7e0ce47581ea189c5bd09b2b0dd28e6e1a4329fc60951eca03a44c0231f8af632222f42855182e918c983ae22e7bff910ba9d81aa891761ebadddb78601e1360afd1addf58e3d68f9d59c79335333072857368299d2f8a26ef2ce4f9eaef107fe391d55be115496e8e2309c2963e12070fe345681135c16cb0d2377926676e31939e653ed559b918a957a52b3b4b4b29cab5d79371362692135db0e76aedee41e74b98bc3012362660790a297d254411b493b30ccf5c5a9033451a1923945e3e3d9203e28eb8a0a19594bd7bbe4ae537d49c601b7d748a617269566c1fe9e125d3729e1e3f550c42e4f11af003bd23cde35a4ee12d23ae4a82ae9a025dd35ecc07443326a8e6351a0cf4bc4639b7b37f3fba1e2b2f75336b8cc5f368c54f141887b02cf703e6330d5377f9c8dcd3cc3b3b2c0ae24eb0dd11bb5cba93cbf1308c7f54907565e382dec68c7e073936788651bf3eb00f824fa51e60eab8cefe51744bbef34b9834347eb3cdfe61267d44807c4c5e6707d4736f58dbe991d1f0c8eb9a9298338d0efd109ac4791cf44519b2b67ce1e29abff0c63bfa1a09006c5094c85cacd91d3215d8a58e028b6d4a2a27705bd3aa753871e6fa560323ba8e458122fb8e8932c8ff57f56d73eaf63a0b7492df1bf766fa7497f5f7343c9281bdde9db40e3a85902c39d1cc7be655b3d5d08dbaa6270dcd847a585fd9f42db3ee307559e2093356e9fa7849fb66196563e5bd976fec28dcdccb4e0c8ca8fee13ea1cc94d7c7a144fca0ad16958ff1e8434a4268015a1389e845b0a76f391813201429347293050fefd99051a5f4651ed304a462c79b7705cf6d6aa43c7b27f9c3f6834634c09a181e9b85b99be89b5d5c7bc775bb53e0b6fe38230fd02059c5e076b37064a38f3675f00783be080dc191c49572ad30d5031db7fe763cd93b07a5c984645c4ac6614f9e10038d5f4c30eee60830864a08a75904f58a77ed6a8dba1db945a7b4cfbea7000a0428a961cc95457478539fbf0425a03a3ce69a52647b9f03081de14120131defab126f77edbb888465577f60bc223f8782b3e6c433f5bd1c2666d63943f3e4f35289571971d5a2d42856b1658df71d3f82632f0a67939187b189fea4c97e72500b784ae3d419133e2ca0454c3bb66f1a0372a579e31e16cce07630bf2fcccd46cb9762e63bd1136e6825afc6b34a72782a5403d7b3eaea48e7996081ac2fcc6226fa6632eb78f3a0a1715445dd83ab6179226137af65d43bf46cbf4a13b451b02cc8ad0426011ba2be52b3645c58315cb2177a093e5e111925e8132457d1e4347c8d761fb38e0788c3145bdd16166e0f0abc5c4d9da52a94fb8c1e7e3d261cc2f3ebae6abf0e365a07bcbf99332dffdbf395faaa3ab82fe80cabd09ebc14b064a349eadf6c17321bf4eaa89141e65f1809a412dbc88273d5314e74b17684d7bd8a1e1130fe6b7608ffc0ec1ebb2aee3b068633d55ef2f89e52b1997a54e5fc8aa36d696915dc3670a3a8e0e91961746984381acc91b2b6d73c6725d56865883b95e9c8694fb39bc16307840e339a252d10bfb526d47c466d40715906a0adb2bc73906d694ba99871a8c3b24d5e676dc8eecfe947718d3598787922a9328e20b2070924497ae9b83c3d5e8049226964f91f55e0b0243a2a50154167b35435e882f2b68c98ec32f273e0c16f18e3c54c8860e7a57fd3aa115dbd93be73fba19c179ae347a9aa197c90505f6cc57c75491ca32445644b25c1a6bebb4be61f33358399fb93bc3c0f4d92954d70d3bc640336a17c84e28525ab96784fb119d0d00652a558f053baae9aa45b7b471c0a7b7a522577789eeb0c14cbb0a490aab5bb34e253aff8006aa46770e1e2709da0051029614dbfcde4b4ef3e9e84fa110c27412f7bf3a008782a472c2ebbd7d20797ed1aef7cbe0c6f0cdfc2384940c7f2289d77a667d926fc87407ec401e6d6fdbded451fa29ac4fced3159fb97688bcbc0b7794129b3bd6084bb6238cdc55e6fa1982434bc73075791a698b27e0da015ffa03080824c2c9147988275c5081afdc6be02e6f68e3073c68bda1d51430b38a0277372c71a80e8d74ac2cf01e99bf797131539fc2ae71f7e4560fd0f998079ce2565e540286b6556c87009621f984e408ff7ab0404c21a4d18738aa861d8b590a87fb4179c38708cae7ebac42cc7303edf011ef1a68df8e543963079f98432274e6e4dd3d237ad11562c88704dc3d8b59728884e4a22b88a8c741cb2712ca26069b3734c1d2be516c0e41947163c075b3f5ad39edf788afbff786a936d5e56df55772900adac67e515cf831457fbf2e05393fdda4d2829f515a3205d7c3bbcfa3890a2790ba0a1235dd4f2ec8081ed403a4ba15bf64560276bf7d96e932db3e7dd2e1dfd15b2baf3531990367c414a3b2cc0f035b92098d7a4e903cedba8c8b0732193446fd9ea0c4824addf9ea172a67916335c1e9c1e2e6fc34be1bb1c1a18591a1e5e4595d0c7ba72bf7d58cbe9eeb744cbc6005ca59fa6edb1612563de26c382ae279ce1050cc10934e9c1459df229096759876fd281da6c1269381878cc5679f456ab40a7757593e59d4f65f98b33f18283382d5d6ec814d7c4665d070e3921241c0a8622062d21b19d962d90b5970b3ff83ea25190bd3923ca60f70c0dbde4a3c3e28a2715a05af3b1af77d9d1318aeea1af98a88ca0c67423cf1db727d2b733f5eaa7dc8165f785a0eb2c40dd1399de6236e0558061fc59ed0d9ca93e6fb64f51647e6fa7438ab3a130aac59102cc9acc0984cf9ab59b52d10e7e69d7a2c338c96ca5a7e95668eaea95c956b5f582c43e195cb71b5643cc165b5a623a2fba4fe7198f20d980a88101301acda24c8dc68155ad2787507cf0cd2d6ebb9a1f37d717f291943e222cb2c98c232a8c29ba893c5810b780e6ee5a87f509f5c565abd081ea70472d54a97dfbf52fbf8be180761f4dbaceecd672a37f1dc9241ef12941bafead8425eec186f76ca4ad9705d42528de14d34a79a7ca13664bce39254b22cc20af2ef01f680d40919135db1eccd64a51eb6f6abbd0d4ed35e19f284f7f5ec0d94cb9fea92946c1f797d34e405b058e18933268f582ba06dd8d8cba9096e5fb9e2c0726747b33701914e7e88933451ec9ef6a6f2fbe1e20ff977a2b182bcd48787169d56a48bfbadcf16ecd6ba0ad75e1869abd8c86b6672652c38f46a7fbdfeeca8004e059305c9848aa9c85c116363c89a68cd16a07243ef402aac06a8aec4410a08a90f0a37d0e67a9d85b0f7d80388b79392725eb8e7254d3adadccfee906421d0fa594bdf92967b07edba907ff1e089ea6e0909b29181f480895ffeebbb52e72896f95f00c3b07a7db63bcef4207943d3b13a032ac6b3acb6119a40bc209d321a443be819b68f43df7429ca4ba2c0331096c21d135691a6d8c550323719af950e50e916e24433f6cd319c20296fe36bb721380fdad1efea61c6f646700044aa95f8ab71040346e3313c5c08f249defbcb46f984594772522a5cd3cf737a8f1050aca136fbd98d978bba5f6dd6ce110fe1aabee6c7ed884193184afa6882dce1800b51227a183673fd729151a32b0345ae1f14a464de941770a42c5227aa4ac20fa07850b47cf049505676b36846103bb5615e3d1b1fb783f4cab93c8da25e074cfa202008157c90ad92071fb1845bd5d734371ab09539ba1d0391b90118e3ed22f4f61a1db33d5b194865c813458dca5d2f660531d6af6a1b7033ac4e1e39bd25f57c669becf95b6f52ba2e063e2c1541882ae4676955eb9a393231e9f3a732095a2da2dd66518964f0ccb12713c59e63757b2108bed675e5dfc5b7d0134725c9a439a785a41bc85abe0949d4524e79522f754da769c02a7686ee88cbfd3ccefcc2c6ce8e735ad003162a3774923085bb0dbaef0959f37f1b82af4c7a6b99b1fa743e2a05406bbc2699c8a2dcf2b50271d837f28f53f0011c06e1f10a85eb76acf6d34ba6f52d12a004d97d3ec6a1f1b50a815a60aef492fad3124b3aef5dae915aec5aeaea35a35aafd4909ba60c0ae0156686926d41b5841812c41d9d2c5c23ddc83de4351fe3827a14f51cc9b24bba3895695d0cf467081ff0138d554f96736d399dd617504df0cc680bb0d7d6cd4f9853354dc03a33354b21a9bf6a60fc109ad30976fee45dd954c9b222c97c91a11264e0335e5bd113c4efb76d79faed345cd47be4b938532b21aeb9d849571ad703a7646d3851d2daf4fec669728468bd8d188e0337ad9f9f9f503a2b8b304c64bedfda241f1932955449615124283fd6a5249c343d50c0b0b7a3d8bb5dd751d2328318fcf52acc821de039a3209c4bfa1c493bf6d637223d780fd43ae880b7bca57b2c931847576f73d34df7ced6f29d56407d34ed457f4c5940e9194cff3e584f41b448722cc9bba4aa3d1277878d163237e09fc9e13f28166ab5ef21e2db7c38812c1c784d9088aecc3c9f678cc2eb328949e54d5545be7fd3595a9e9005f8d2aa54bc8d9a4517a908f5ad0fde23c770b85b4aca51e8c63d6ad32d1b3f373148b5839eafb802606a0dcaca06b69f86972c819371ba741a798d02fdfb43581d9b620552942354c45ecdfcd811077d10536a42516693c124952305049688c5f0e8727ff7592247d9d1d13a2dd2be3aa79160bd4076a97e226205707417c28bb451c62d5a0ab235a0756f73ec0283a1f50cda08bd17be848b8c66b58bf199ef7a6f69f0a5b701ada82c01dad176b67d798374099fede94b6e9aab48df285492ff58464ad7276c6002fca5bb55b3fdfab3977947f5b32f536284468630c879f8654d25c7338fcbfd450a07743bdb978fd14f842721498bed94622c0b02415841cc6d8de9f7dadf4f18d1ca0d49b74c2260e52d953ff231f5f5ec39a39bba19bf382ef74bc98c80d601d80187715a776315f98699b9be933a7c745f2a947d5171d81b018a8d88d9c2940a8d1a584d91b6c55738381da3e113202c697ed3afdf57156489b8038b99c90c463ee26f64929960c3f1e87ddcb6fc9ca283f303aa645f4c0b71941b9b47bc43121973e96f04f7e888cdabe7935edd564f2f47bd441d5aa49c7047410fea98798a52d0281059577d92fd6d275257a04df9662d6602c31b3b595d9928b91f7e9fb8fbfc6d07672a3824f47b8727e81c18a5d561182c04d02c37af763c1f7fb17043beeaa6cd137415af891c9d6ab2087655de425dbc9354344c7c174069a1fb6068af24d9d933f5980cebc1d73c592ca959bae45948f6a571a19975076bbbed999f2a4c1b23472ff1700e9615aacba8ec6b8ef1a85435f49b9625a212064e1be848b1ff91203f3da46164e6d7e3cd97416763e7b9e853898970acf5c6b8e8f9bc2822178eb2d2a6c8cebfd48255745f06771a6bfdae9cc3e21547909836de1667aa6d4ef9ba49eaf7798c0506d6106235d014176e2dc822924a", 0x1000, 0x5, 0x2, 0x10000, 0x4, 0x3, &(0x7f0000001000)="5666b0d6493fef12f5c64a9a30721e3394ff253c6aac9c169e0fd23842e0a529701330931c7cfe524f86395d89928818c1639ccdfadc06406d8efaa40a3dd6f849db40bc8ee47f9f2ed39e185a35772fafb814390cd7a9561c0429b510950bb18f4c2d6c334edf57c2e9439d5b284f1410975742aa3cebe88e2836be1e71e0255a14951cac7c16374226e0a811b3f3"}) (async) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) 00:27:10 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000010c0)=@urb_type_bulk={0x3, {0xb}, 0x9, 0x0, &(0x7f0000000000)="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", 0x1000, 0x5, 0x2, 0x10000, 0x4, 0x3, &(0x7f0000001000)="5666b0d6493fef12f5c64a9a30721e3394ff253c6aac9c169e0fd23842e0a529701330931c7cfe524f86395d89928818c1639ccdfadc06406d8efaa40a3dd6f849db40bc8ee47f9f2ed39e185a35772fafb814390cd7a9561c0429b510950bb18f4c2d6c334edf57c2e9439d5b284f1410975742aa3cebe88e2836be1e71e0255a14951cac7c16374226e0a811b3f3"}) (async, rerun: 64) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) (rerun: 64) 00:27:10 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 3: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2084c0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r0}}, 0x18) 00:27:10 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) socket$nl_generic(0x10, 0x3, 0x10) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 3: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2084c0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2084c0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r0}}, 0x18) (async) 00:27:10 executing program 4: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x8080) epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 3: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2084c0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r0}}, 0x18) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x0) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) 00:27:10 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:10 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:10 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0x3}}, 0x20) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}], 0x3, 0x0) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0x3}}, 0x20) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}], 0x2, 0x0) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}}}, 0x90) 00:27:10 executing program 5: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000240)=[{}], 0x1, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0x3}}, 0x20) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) 00:27:10 executing program 5: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:10 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 00:27:10 executing program 5: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000010c0)=@urb_type_bulk={0x3, {0xb}, 0x9, 0x0, &(0x7f0000000000)="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", 0x1000, 0x5, 0x2, 0x10000, 0x4, 0x3, &(0x7f0000001000)="5666b0d6493fef12f5c64a9a30721e3394ff253c6aac9c169e0fd23842e0a529701330931c7cfe524f86395d89928818c1639ccdfadc06406d8efaa40a3dd6f849db40bc8ee47f9f2ed39e185a35772fafb814390cd7a9561c0429b510950bb18f4c2d6c334edf57c2e9439d5b284f1410975742aa3cebe88e2836be1e71e0255a14951cac7c16374226e0a811b3f3"}) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000040)) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) [ 66.539876][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 66.539888][ T24] audit: type=1400 audit(1641342430.583:101): avc: denied { append } for pid=10857 comm="syz-executor.2" name="vsock" dev="devtmpfs" ino=231 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000040)) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000010c0)=@urb_type_bulk={0x3, {0xb}, 0x9, 0x0, &(0x7f0000000000)="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", 0x1000, 0x5, 0x2, 0x10000, 0x4, 0x3, &(0x7f0000001000)="5666b0d6493fef12f5c64a9a30721e3394ff253c6aac9c169e0fd23842e0a529701330931c7cfe524f86395d89928818c1639ccdfadc06406d8efaa40a3dd6f849db40bc8ee47f9f2ed39e185a35772fafb814390cd7a9561c0429b510950bb18f4c2d6c334edf57c2e9439d5b284f1410975742aa3cebe88e2836be1e71e0255a14951cac7c16374226e0a811b3f3"}) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={r1, r2, 0x645e8d8d}) 00:27:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000010c0)=@urb_type_bulk={0x3, {0xb}, 0x9, 0x0, &(0x7f0000000000)="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", 0x1000, 0x5, 0x2, 0x10000, 0x4, 0x3, &(0x7f0000001000)="5666b0d6493fef12f5c64a9a30721e3394ff253c6aac9c169e0fd23842e0a529701330931c7cfe524f86395d89928818c1639ccdfadc06406d8efaa40a3dd6f849db40bc8ee47f9f2ed39e185a35772fafb814390cd7a9561c0429b510950bb18f4c2d6c334edf57c2e9439d5b284f1410975742aa3cebe88e2836be1e71e0255a14951cac7c16374226e0a811b3f3"}) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000040)) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r8) 00:27:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x1}}, 0x20) (async) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x9}}, 0x18) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 00:27:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) 00:27:10 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x2) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) (async) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r6}, 0x8) 00:27:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) 00:27:10 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) (async) 00:27:10 executing program 5: syz_open_dev$usbfs(0x0, 0x1, 0x2) 00:27:10 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000440)={r3, r4, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r6) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r6) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r7, 0x200, 0x70bd2c, 0x27dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x44}, 0x1, 0x0, 0x0, 0xe0}, 0x0) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:10 executing program 2: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x144, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7f, 0x54}}}}, [@NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3f}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xc5, 0xbe, "13ad432396f75080c0cf3baf47cdaab75bd6f4fe0ba4a9eddee76d0f86a8987fe378e6c14a6f177fe8dfcd8e92ffdb34ede6edfdf6755c070c563bf6c1a7d0ae5e4b9a3a3a7f5b6d42476a19434433eff38783d040b843ac4dde0844824fd5ea1e7158dcc49f783f991ec6118420dddb0d8c201e328c5c5b6dd7fe766a247f61509b292ef124b2b07b1423a79c5037cc31b727c309beead8a8d9055b316b618d7b693cd22c567df132f2c8d96f270ff0da9c8c0417043a28172b3b5d57d1d78381"}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xe, 0xbd, [0x1, 0x5, 0x1000, 0xf9, 0xb75]}]}, 0x144}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x15c, r0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xb3, 0x3}}}}, [@NL80211_ATTR_FRAME={0x1e, 0x33, @mgmt_frame=@disassoc={@wo_ht={{}, {}, @broadcast, @device_a, @from_mac=@device_b, {0x0, 0x14}}, 0xf, @void}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x22, 0x33, @mgmt_frame=@disassoc={@with_ht={{{0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}, {0x1}, @device_b, @device_b, @random="aca822c02a82"}, @ver_80211n={0x0, 0x636, 0x1, 0x3, 0x0, 0x2, 0x1}}, 0x12, @void}}, @NL80211_ATTR_FRAME={0x52, 0x33, @ctrl_frame=@bar={{}, {}, @device_b, @broadcast, @multi={{0x1, 0x1, 0x1, 0x0, 0x5}, [{0x0, 0x2, {0x0, 0x2}, "8d7e9a761076196c"}, {0x0, 0x6, {0x6, 0x700}, "2e3c3b9b97eafc3b"}, {0x0, 0x0, {0xe, 0x9}, "42f5ab038ad76a21"}, {0x0, 0x3, {0x1, 0x40}, "1b1bd1396b068d6f"}, {0x0, 0xf, {0x9}, "f14a5d54f5ad8d88"}]}}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@cts={{}, {0x5}, @broadcast}}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@pspoll}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {}, @device_b}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {0x4}, @device_b}}, @NL80211_ATTR_FRAME={0x3d, 0x33, @mgmt_frame=@action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x3f}, @broadcast, @device_b, @from_mac=@broadcast, {0x9, 0x9}}, @tdls_chsw_req={0xc, 0x5, {0x64, 0x0, @val={0x3e, 0x1, 0x2}, {0x65, 0x12, {@from_mac=@device_b, @broadcast, @device_b}}, {0x68, 0x4, {0x1000, 0x1}}}}}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8000}, 0x11) 00:27:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 00:27:10 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:10 executing program 5: syz_open_dev$usbfs(0x0, 0x1, 0x2) 00:27:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:11 executing program 5: syz_open_dev$usbfs(0x0, 0x1, 0x2) 00:27:11 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) 00:27:11 executing program 2: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x144, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7f, 0x54}}}}, [@NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3f}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xc5, 0xbe, "13ad432396f75080c0cf3baf47cdaab75bd6f4fe0ba4a9eddee76d0f86a8987fe378e6c14a6f177fe8dfcd8e92ffdb34ede6edfdf6755c070c563bf6c1a7d0ae5e4b9a3a3a7f5b6d42476a19434433eff38783d040b843ac4dde0844824fd5ea1e7158dcc49f783f991ec6118420dddb0d8c201e328c5c5b6dd7fe766a247f61509b292ef124b2b07b1423a79c5037cc31b727c309beead8a8d9055b316b618d7b693cd22c567df132f2c8d96f270ff0da9c8c0417043a28172b3b5d57d1d78381"}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xe, 0xbd, [0x1, 0x5, 0x1000, 0xf9, 0xb75]}]}, 0x144}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x15c, r0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xb3, 0x3}}}}, [@NL80211_ATTR_FRAME={0x1e, 0x33, @mgmt_frame=@disassoc={@wo_ht={{}, {}, @broadcast, @device_a, @from_mac=@device_b, {0x0, 0x14}}, 0xf, @void}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x22, 0x33, @mgmt_frame=@disassoc={@with_ht={{{0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}, {0x1}, @device_b, @device_b, @random="aca822c02a82"}, @ver_80211n={0x0, 0x636, 0x1, 0x3, 0x0, 0x2, 0x1}}, 0x12, @void}}, @NL80211_ATTR_FRAME={0x52, 0x33, @ctrl_frame=@bar={{}, {}, @device_b, @broadcast, @multi={{0x1, 0x1, 0x1, 0x0, 0x5}, [{0x0, 0x2, {0x0, 0x2}, "8d7e9a761076196c"}, {0x0, 0x6, {0x6, 0x700}, "2e3c3b9b97eafc3b"}, {0x0, 0x0, {0xe, 0x9}, "42f5ab038ad76a21"}, {0x0, 0x3, {0x1, 0x40}, "1b1bd1396b068d6f"}, {0x0, 0xf, {0x9}, "f14a5d54f5ad8d88"}]}}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@cts={{}, {0x5}, @broadcast}}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@pspoll}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {}, @device_b}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {0x4}, @device_b}}, @NL80211_ATTR_FRAME={0x3d, 0x33, @mgmt_frame=@action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x3f}, @broadcast, @device_b, @from_mac=@broadcast, {0x9, 0x9}}, @tdls_chsw_req={0xc, 0x5, {0x64, 0x0, @val={0x3e, 0x1, 0x2}, {0x65, 0x12, {@from_mac=@device_b, @broadcast, @device_b}}, {0x68, 0x4, {0x1000, 0x1}}}}}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8000}, 0x11) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x144, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7f, 0x54}}}}, [@NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3f}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xc5, 0xbe, "13ad432396f75080c0cf3baf47cdaab75bd6f4fe0ba4a9eddee76d0f86a8987fe378e6c14a6f177fe8dfcd8e92ffdb34ede6edfdf6755c070c563bf6c1a7d0ae5e4b9a3a3a7f5b6d42476a19434433eff38783d040b843ac4dde0844824fd5ea1e7158dcc49f783f991ec6118420dddb0d8c201e328c5c5b6dd7fe766a247f61509b292ef124b2b07b1423a79c5037cc31b727c309beead8a8d9055b316b618d7b693cd22c567df132f2c8d96f270ff0da9c8c0417043a28172b3b5d57d1d78381"}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xe, 0xbd, [0x1, 0x5, 0x1000, 0xf9, 0xb75]}]}, 0x144}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x15c, r0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xb3, 0x3}}}}, [@NL80211_ATTR_FRAME={0x1e, 0x33, @mgmt_frame=@disassoc={@wo_ht={{}, {}, @broadcast, @device_a, @from_mac=@device_b, {0x0, 0x14}}, 0xf, @void}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x22, 0x33, @mgmt_frame=@disassoc={@with_ht={{{0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}, {0x1}, @device_b, @device_b, @random="aca822c02a82"}, @ver_80211n={0x0, 0x636, 0x1, 0x3, 0x0, 0x2, 0x1}}, 0x12, @void}}, @NL80211_ATTR_FRAME={0x52, 0x33, @ctrl_frame=@bar={{}, {}, @device_b, @broadcast, @multi={{0x1, 0x1, 0x1, 0x0, 0x5}, [{0x0, 0x2, {0x0, 0x2}, "8d7e9a761076196c"}, {0x0, 0x6, {0x6, 0x700}, "2e3c3b9b97eafc3b"}, {0x0, 0x0, {0xe, 0x9}, "42f5ab038ad76a21"}, {0x0, 0x3, {0x1, 0x40}, "1b1bd1396b068d6f"}, {0x0, 0xf, {0x9}, "f14a5d54f5ad8d88"}]}}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@cts={{}, {0x5}, @broadcast}}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@pspoll}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {}, @device_b}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {0x4}, @device_b}}, @NL80211_ATTR_FRAME={0x3d, 0x33, @mgmt_frame=@action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x3f}, @broadcast, @device_b, @from_mac=@broadcast, {0x9, 0x9}}, @tdls_chsw_req={0xc, 0x5, {0x64, 0x0, @val={0x3e, 0x1, 0x2}, {0x65, 0x12, {@from_mac=@device_b, @broadcast, @device_b}}, {0x68, 0x4, {0x1000, 0x1}}}}}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8000}, 0x11) (async) 00:27:11 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:11 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x0, 0x2) 00:27:11 executing program 2: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x144, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7f, 0x54}}}}, [@NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3f}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xc5, 0xbe, "13ad432396f75080c0cf3baf47cdaab75bd6f4fe0ba4a9eddee76d0f86a8987fe378e6c14a6f177fe8dfcd8e92ffdb34ede6edfdf6755c070c563bf6c1a7d0ae5e4b9a3a3a7f5b6d42476a19434433eff38783d040b843ac4dde0844824fd5ea1e7158dcc49f783f991ec6118420dddb0d8c201e328c5c5b6dd7fe766a247f61509b292ef124b2b07b1423a79c5037cc31b727c309beead8a8d9055b316b618d7b693cd22c567df132f2c8d96f270ff0da9c8c0417043a28172b3b5d57d1d78381"}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xe, 0xbd, [0x1, 0x5, 0x1000, 0xf9, 0xb75]}]}, 0x144}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x15c, r0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xb3, 0x3}}}}, [@NL80211_ATTR_FRAME={0x1e, 0x33, @mgmt_frame=@disassoc={@wo_ht={{}, {}, @broadcast, @device_a, @from_mac=@device_b, {0x0, 0x14}}, 0xf, @void}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x22, 0x33, @mgmt_frame=@disassoc={@with_ht={{{0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}, {0x1}, @device_b, @device_b, @random="aca822c02a82"}, @ver_80211n={0x0, 0x636, 0x1, 0x3, 0x0, 0x2, 0x1}}, 0x12, @void}}, @NL80211_ATTR_FRAME={0x52, 0x33, @ctrl_frame=@bar={{}, {}, @device_b, @broadcast, @multi={{0x1, 0x1, 0x1, 0x0, 0x5}, [{0x0, 0x2, {0x0, 0x2}, "8d7e9a761076196c"}, {0x0, 0x6, {0x6, 0x700}, "2e3c3b9b97eafc3b"}, {0x0, 0x0, {0xe, 0x9}, "42f5ab038ad76a21"}, {0x0, 0x3, {0x1, 0x40}, "1b1bd1396b068d6f"}, {0x0, 0xf, {0x9}, "f14a5d54f5ad8d88"}]}}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@cts={{}, {0x5}, @broadcast}}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@pspoll}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {}, @device_b}}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {0x4}, @device_b}}, @NL80211_ATTR_FRAME={0x3d, 0x33, @mgmt_frame=@action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x3f}, @broadcast, @device_b, @from_mac=@broadcast, {0x9, 0x9}}, @tdls_chsw_req={0xc, 0x5, {0x64, 0x0, @val={0x3e, 0x1, 0x2}, {0x65, 0x12, {@from_mac=@device_b, @broadcast, @device_b}}, {0x68, 0x4, {0x1000, 0x1}}}}}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8000}, 0x11) 00:27:11 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r5) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x0, 0x2) 00:27:11 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRES64=r0, @ANYRES16, @ANYBLOB="200027bd7000fddbdf250a000000050030000100000008000b000100000008003b000700000005002d00000000000500370001000000050038000100000008003100030000000a000900000000000000000008000b00000000000600280002000000", @ANYRESHEX=r0, @ANYRES64], 0x68}}, 0x800) 00:27:11 executing program 1: openat$vsock(0xffffffffffffff9c, 0x0, 0x542, 0x0) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x0, 0x2) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r5) 00:27:11 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRES64=r0, @ANYRES16, @ANYBLOB="200027bd7000fddbdf250a000000050030000100000008000b000100000008003b000700000005002d00000000000500370001000000050038000100000008003100030000000a000900000000000000000008000b00000000000600280002000000", @ANYRESHEX=r0, @ANYRES64], 0x68}}, 0x800) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 1: openat$vsock(0xffffffffffffff9c, 0x0, 0x542, 0x0) 00:27:11 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x0) 00:27:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRES64=r0, @ANYRES16, @ANYBLOB="200027bd7000fddbdf250a000000050030000100000008000b000100000008003b000700000005002d00000000000500370001000000050038000100000008003100030000000a000900000000000000000008000b00000000000600280002000000", @ANYRESHEX=r0, @ANYRES64], 0x68}}, 0x800) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRES64=r0, @ANYRES16, @ANYBLOB="200027bd7000fddbdf250a000000050030000100000008000b000100000008003b000700000005002d00000000000500370001000000050038000100000008003100030000000a000900000000000000000008000b00000000000600280002000000", @ANYRESHEX=r0, @ANYRES64], 0x68}}, 0x800) (async) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:11 executing program 1: openat$vsock(0xffffffffffffff9c, 0x0, 0x542, 0x0) 00:27:11 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x0) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:27:11 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe8, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@crypto_settings=[@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x805}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_AKM_SUITES={0x28, 0x4c, [0xb6e72d6c7772b13c, 0x6, 0xfac14, 0xfac02, 0xfac07, 0xfac10, 0xfac13, 0xfac11, 0xfac13]}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x4}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x6002}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x14, 0x49, [0xfac0c, 0xfac0a, 0xfac0d, 0xfac0c]}, @NL80211_ATTR_SAE_PASSWORD={0x6f, 0x115, "850fe7a70ffe2a00719bfd426d5346e1963ec1b2bb7d24e42dd8aa68b634b608ba121cd34f376924855cb94098170c3fd9af67d462c8b92406b92c76d29466386636c281605476eb71061672be79d72585c2c40397a19c97ca73112a2a564573392cfe55d440bac482d166"}], @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4008000}, 0x4040050) 00:27:11 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) 00:27:11 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x1, 0x0) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) 00:27:11 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe8, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@crypto_settings=[@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x805}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_AKM_SUITES={0x28, 0x4c, [0xb6e72d6c7772b13c, 0x6, 0xfac14, 0xfac02, 0xfac07, 0xfac10, 0xfac13, 0xfac11, 0xfac13]}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x4}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x6002}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x14, 0x49, [0xfac0c, 0xfac0a, 0xfac0d, 0xfac0c]}, @NL80211_ATTR_SAE_PASSWORD={0x6f, 0x115, "850fe7a70ffe2a00719bfd426d5346e1963ec1b2bb7d24e42dd8aa68b634b608ba121cd34f376924855cb94098170c3fd9af67d462c8b92406b92c76d29466386636c281605476eb71061672be79d72585c2c40397a19c97ca73112a2a564573392cfe55d440bac482d166"}], @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4008000}, 0x4040050) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) (async) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe8, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@crypto_settings=[@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x805}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_AKM_SUITES={0x28, 0x4c, [0xb6e72d6c7772b13c, 0x6, 0xfac14, 0xfac02, 0xfac07, 0xfac10, 0xfac13, 0xfac11, 0xfac13]}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x4}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x6002}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x14, 0x49, [0xfac0c, 0xfac0a, 0xfac0d, 0xfac0c]}, @NL80211_ATTR_SAE_PASSWORD={0x6f, 0x115, "850fe7a70ffe2a00719bfd426d5346e1963ec1b2bb7d24e42dd8aa68b634b608ba121cd34f376924855cb94098170c3fd9af67d462c8b92406b92c76d29466386636c281605476eb71061672be79d72585c2c40397a19c97ca73112a2a564573392cfe55d440bac482d166"}], @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4008000}, 0x4040050) (async) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x0, 0x2) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe8, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@crypto_settings=[@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x805}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_AKM_SUITES={0x28, 0x4c, [0xb6e72d6c7772b13c, 0x6, 0xfac14, 0xfac02, 0xfac07, 0xfac10, 0xfac13, 0xfac11, 0xfac13]}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x4}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x6002}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x14, 0x49, [0xfac0c, 0xfac0a, 0xfac0d, 0xfac0c]}, @NL80211_ATTR_SAE_PASSWORD={0x6f, 0x115, "850fe7a70ffe2a00719bfd426d5346e1963ec1b2bb7d24e42dd8aa68b634b608ba121cd34f376924855cb94098170c3fd9af67d462c8b92406b92c76d29466386636c281605476eb71061672be79d72585c2c40397a19c97ca73112a2a564573392cfe55d440bac482d166"}], @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4008000}, 0x4040050) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x0, 0x2) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000440)={r2, r3, 0x645e8d8d}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x90) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:11 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x202402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x0, 0x2) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000440)={r1, r2, 0x645e8d8d}) 00:27:11 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x202402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x202402, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) (async) 00:27:11 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 5: syz_open_dev$usbfs(0x0, 0x0, 0x2) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000140)={0x7a4, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x790, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2a}]}]}, {0x704, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x471}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2f}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1711}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1716}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1c5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x444, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe6a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5c3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xdbf6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80b}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xf0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x88}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x39f}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}]}]}]}, 0x7a4}, 0x1, 0x0, 0x0, 0x4000}, 0x4008094) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x202402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:11 executing program 5: syz_open_dev$usbfs(0x0, 0x0, 0x2) 00:27:11 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 2: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) r0 = epoll_create1(0x80000) epoll_create(0x1ff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) 00:27:11 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x9}}, 0x18) 00:27:11 executing program 5: syz_open_dev$usbfs(0x0, 0x0, 0x2) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x542, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, 0x0, 0x0) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) 00:27:11 executing program 2: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2c8441, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000001100), 0x0, 0x0) 00:27:11 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:11 executing program 2: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) (async) 00:27:11 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x34, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x4}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x3f}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:11 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, r2, 0xc3}) 00:27:11 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x880, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x84) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x110, r1, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x80}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xfffb}, @NL80211_ATTR_FRAME_MATCH={0xde, 0x5b, "208fdf8ba8bde4e2f68c94ce98e0cb3e00a5c4ed8d53d9e0e940efe494537ef90571ac5c88eb5b08d74765c9ae904fa24433f8d1f24355e80bc95cd25eade39d9bcf465103b852ca4661647a1d670630cc8eee611cb95dd751b711dfce9c40b5e6655bc6e234479a7f61d83f823c555f31f755689ce77f2be02f2bdcd3d5f2ca0e1cc465d5b9f62d54047e414f21d010f355ee37c46abd73a1448a425b11b24a6430feed31a17f4d5d704688ac946d4cd9fb19c266a69674d2e40d123f12da7dee93c36a56895532460d0f070bef0f58f5cbc5cd46b52d7db973"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0xde95206cf66c905a) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x72}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040081) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x58, 0x5ce4, 0x0, @mcast2, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x40, 0x25, 0x2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x2f, 0xc0, 0x0, 0x8001, 0x10, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8000, 0x56, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x10c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4880}, 0x40080) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000880)={'sit0\x00', &(0x7f0000000800)={'syztnl1\x00', r4, 0x4, 0x1, 0x80, 0x80000000, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x8, 0x8000, 0x81, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xc0, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10000800}, 0x20000804) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), r0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x58, r7, 0x600, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 00:27:11 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) 00:27:11 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) (async, rerun: 32) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (rerun: 32) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, r2, 0xc3}) 00:27:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, r2, 0xc3}) 00:27:11 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (rerun: 64) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async, rerun: 64) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (rerun: 64) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, r2, 0xc3}) 00:27:11 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, r2, 0xc3}) 00:27:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 2: ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x9, "895e1158e972e8650a67ff60323076bec31dce74d6609782dd20ea0e074e8aeed5f5016cdcc4346e75007febe8a83cfb180ce0094b5b528299b0e792f69e7ec0d70e6ef3cd393ad7ad3612a69e268d76c71aa2c6cc83ab3f35983e2e142f0e799c7adb5b368760c12549cb8499cb8fd5b0287310b5859030ef33dc54abb15612c0e7605e43d087090dac25ab7f335e58c2d9ebc3ce461aeb0c46b6c4bd21ff1354da3793bf3d638da1663676beda3c13488218a8245bc6ca799aa5ab055a6c43e221aa4246656d93449a91fa86ebb87bb05917abd4c6542b12e077c1cb89679a70b08efd8a31d4796f5a92cf3e7db50f661ddda863c372fba7136871a1a68c73"}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, r2, 0xc3}) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 2: ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x9, "895e1158e972e8650a67ff60323076bec31dce74d6609782dd20ea0e074e8aeed5f5016cdcc4346e75007febe8a83cfb180ce0094b5b528299b0e792f69e7ec0d70e6ef3cd393ad7ad3612a69e268d76c71aa2c6cc83ab3f35983e2e142f0e799c7adb5b368760c12549cb8499cb8fd5b0287310b5859030ef33dc54abb15612c0e7605e43d087090dac25ab7f335e58c2d9ebc3ce461aeb0c46b6c4bd21ff1354da3793bf3d638da1663676beda3c13488218a8245bc6ca799aa5ab055a6c43e221aa4246656d93449a91fa86ebb87bb05917abd4c6542b12e077c1cb89679a70b08efd8a31d4796f5a92cf3e7db50f661ddda863c372fba7136871a1a68c73"}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x9, "895e1158e972e8650a67ff60323076bec31dce74d6609782dd20ea0e074e8aeed5f5016cdcc4346e75007febe8a83cfb180ce0094b5b528299b0e792f69e7ec0d70e6ef3cd393ad7ad3612a69e268d76c71aa2c6cc83ab3f35983e2e142f0e799c7adb5b368760c12549cb8499cb8fd5b0287310b5859030ef33dc54abb15612c0e7605e43d087090dac25ab7f335e58c2d9ebc3ce461aeb0c46b6c4bd21ff1354da3793bf3d638da1663676beda3c13488218a8245bc6ca799aa5ab055a6c43e221aa4246656d93449a91fa86ebb87bb05917abd4c6542b12e077c1cb89679a70b08efd8a31d4796f5a92cf3e7db50f661ddda863c372fba7136871a1a68c73"}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x513380, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 4: sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x27, 0x0, 0x2, 0x2, 0x4, 0x81, "38292fcb6e965bae13706766c79191c4c92491f310a97d369d2785568d919b2f0dfdd0eea207ec0433064cff928d01537cbff6c91550a581ca72b8d7b02c39", 0x1f}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000080)="65b9dd3cffbacc27b069903bda7c3d4680b16646ab671055754e0bd0645b2b2af7d9bdc80c556787138a785a373fa2225279a49ee021b3a01952b6f933c175ea2eba1b2e11030c68f7687a28a1c5ef8d91f2dada2587b131007942b4d97b8cf98d4360a1b694cee9b172318d32554b17cf640c407fe58f483ffc84f8b6c30f73b14775d96c252ecf08fbf3016fefb6190b96e53d4be1446048046473a87b881cbf731af94099f14e3e776b1f475b6da595afc6fac8", 0xb5}, {&(0x7f0000000140)="114bc7445df21d28a7af56bf1fede68495ebb4059fe86a169741acb7111e92f95a3bceadd4bc4f6f609b6ae0264831144fe3928212374cb97fddb263cc479dcb618683a9bc09c43314bd048695e4d02301b511691a6e56529c8045cb052add7f3218a4e9c571e31d0dd2f20accba4eb86573780c42ff586d984b1f9f5f4a161a4291af5c880fe90ad88630ac58f23e87f051bbda7f8f7ab68346c75b07c06b", 0x9f}, {&(0x7f0000000200)="229f2e5af26560255913415b49329154f02d26e091ffb8061a86277959d181520ec958a566754126aa7f7aace3e41c80b7487a872a06b4396970ec5d9c84662d91ebbf0205b2f4d282c13abfafc1d53c0ca45747fe3a3a3168fba2f76ff5cc021fa973feaff3010c6f96e24d2b3f65ce44de70225583d1ad96191089efc62155444db47eeac720e2b6325148ae576defee104a460836ea4b2a0c3f7cb462679bf6118a24b5eb0ef533938dc7cf6e9da0b61a34cb0582860eb5c809cd0dffef", 0xbf}], 0x3, &(0x7f0000000300)={0x60, 0x3a, 0x7fffffff, "6f7243c12120629968749a648d39d9b81fa6077b65107506a56d2ad821f3db090ce458e155de5282a2e289b269a57a4a88ebbf910a616745e06f6183c615d4e71b4b5afafc1c6ca07217c66c047a51"}, 0x60, 0x14000014}, 0x20000001) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) epoll_create(0x1ff) 00:27:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, r2, 0xc3}) 00:27:11 executing program 2: ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x9, "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"}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000000)={0x9, "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"}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) 00:27:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0xc3}) 00:27:11 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) epoll_create1(0x80000) 00:27:11 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x640482, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0xffffffffffffff6a) 00:27:11 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0xc3}) 00:27:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "8b7d9bd21f8f70e12167fd9051ffbe157f580d4dee7b71956b3beac7faa17f9607ca4786023f3e59f7c11457b33c6a98f55e0620021496a8f75bd162978bd362c8aa05456aa631caf2dad3ba3d6df8ca4a9ad4effc791867e0b964e4130d52f4ad32ddcdd4b6f052a3eaa475eb54824376ff641a24f522c8a9aa40f196dd70d2f904de7b8ad66aee0802388a8d9c5d2f85821f8ea56891a76b9368029e5ea286965fe60f474d759e4b3efc29ac79b8b9e260b52c88f1f3531a33ef44c06eff89ae450ad038bec9091633f9aa6754e1bea2d4f8152e71f2a943fe0c553555f204a03f1f921d7ddfb53d4ff2adf97a85a7f59f872b703cdfda90530e80848da314", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x640482, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0xffffffffffffff6a) 00:27:11 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:11 executing program 1: epoll_create(0x80) socket$caif_seqpacket(0x25, 0x5, 0x5) 00:27:11 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 00:27:11 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:11 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x11b8}}, 0x18) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0xc3}) 00:27:11 executing program 1: socket$caif_seqpacket(0x25, 0x5, 0x5) 00:27:11 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x640482, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0xffffffffffffff6a) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x640482, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0xffffffffffffff6a) (async) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:12 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0xc3}) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "8b7d9bd21f8f70e12167fd9051ffbe157f580d4dee7b71956b3beac7faa17f9607ca4786023f3e59f7c11457b33c6a98f55e0620021496a8f75bd162978bd362c8aa05456aa631caf2dad3ba3d6df8ca4a9ad4effc791867e0b964e4130d52f4ad32ddcdd4b6f052a3eaa475eb54824376ff641a24f522c8a9aa40f196dd70d2f904de7b8ad66aee0802388a8d9c5d2f85821f8ea56891a76b9368029e5ea286965fe60f474d759e4b3efc29ac79b8b9e260b52c88f1f3531a33ef44c06eff89ae450ad038bec9091633f9aa6754e1bea2d4f8152e71f2a943fe0c553555f204a03f1f921d7ddfb53d4ff2adf97a85a7f59f872b703cdfda90530e80848da314", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 1: socket$caif_seqpacket(0x25, 0x5, 0x0) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0xc3}) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 00:27:12 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) (async) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) (async) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x101080, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 00:27:12 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0xc3}) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) (async) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) (async) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 00:27:12 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0xc3}) 00:27:12 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x2, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x4, 0x6, 0x6, 0x40, 0x54, 0xfffffffe, &(0x7f0000000000)="55e959a66653c45ee441ca0c068ebccee6f7ab96a99b4490229852c59b33c03644b958f29702be3e05ecb057c153ae175ec4d8238d7cd614b69f7e8bffcd7e0573a95a16f62ca6f90e0698f4c079e3d687baf7eb"}) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (fail_nth: 1) [ 68.179857][T11354] FAULT_INJECTION: forcing a failure. [ 68.179857][T11354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.193064][T11354] CPU: 1 PID: 11354 Comm: syz-executor.5 Not tainted 5.16.0-rc8-syzkaller #0 [ 68.201837][T11354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.211891][T11354] Call Trace: [ 68.215171][T11354] [ 68.218101][T11354] dump_stack_lvl+0xd6/0x122 [ 68.222707][T11354] dump_stack+0x11/0x1b [ 68.226908][T11354] should_fail+0x23c/0x250 [ 68.231356][T11354] should_fail_usercopy+0x16/0x20 [ 68.236387][T11354] _copy_to_user+0x1c/0x90 [ 68.240812][T11354] simple_read_from_buffer+0xab/0x120 [ 68.246196][T11354] proc_fail_nth_read+0x10d/0x150 [ 68.251480][T11354] ? proc_fault_inject_write+0x230/0x230 [ 68.257145][T11354] vfs_read+0x1e6/0x750 [ 68.261363][T11354] ? __fget_files+0x1d2/0x210 [ 68.266075][T11354] ksys_read+0xd9/0x190 [ 68.270328][T11354] __x64_sys_read+0x3e/0x50 [ 68.274946][T11354] do_syscall_64+0x44/0xd0 [ 68.279369][T11354] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.285368][T11354] RIP: 0033:0x7f7e6c569a4c [ 68.289784][T11354] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 68.309394][T11354] RSP: 002b:00007f7e6b72d160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 68.318216][T11354] RAX: ffffffffffffffda RBX: 00007f7e6c6c9f60 RCX: 00007f7e6c569a4c 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x4, 0x6, 0x6, 0x40, 0x54, 0xfffffffe, &(0x7f0000000000)="55e959a66653c45ee441ca0c068ebccee6f7ab96a99b4490229852c59b33c03644b958f29702be3e05ecb057c153ae175ec4d8238d7cd614b69f7e8bffcd7e0573a95a16f62ca6f90e0698f4c079e3d687baf7eb"}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x4, 0x6, 0x6, 0x40, 0x54, 0xfffffffe, &(0x7f0000000000)="55e959a66653c45ee441ca0c068ebccee6f7ab96a99b4490229852c59b33c03644b958f29702be3e05ecb057c153ae175ec4d8238d7cd614b69f7e8bffcd7e0573a95a16f62ca6f90e0698f4c079e3d687baf7eb"}) (async) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 00:27:12 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x4, 0x6, 0x6, 0x40, 0x54, 0xfffffffe, &(0x7f0000000000)="55e959a66653c45ee441ca0c068ebccee6f7ab96a99b4490229852c59b33c03644b958f29702be3e05ecb057c153ae175ec4d8238d7cd614b69f7e8bffcd7e0573a95a16f62ca6f90e0698f4c079e3d687baf7eb"}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x4, 0x6, 0x6, 0x40, 0x54, 0xfffffffe, &(0x7f0000000000)="55e959a66653c45ee441ca0c068ebccee6f7ab96a99b4490229852c59b33c03644b958f29702be3e05ecb057c153ae175ec4d8238d7cd614b69f7e8bffcd7e0573a95a16f62ca6f90e0698f4c079e3d687baf7eb"}) (async) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) [ 68.326188][T11354] RDX: 000000000000000f RSI: 00007f7e6b72d1e0 RDI: 0000000000000003 [ 68.334295][T11354] RBP: 00007f7e6b72d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 68.342294][T11354] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 68.350438][T11354] R13: 00007ffc4a6fa98f R14: 00007f7e6b72d300 R15: 0000000000022000 [ 68.358416][T11354] 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffff98) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x2, 0xffffe76e, "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", 0x59, 0x41, 0x89, 0x20, 0x3, 0x80, 0x78, 0x1}, r0}}, 0x128) 00:27:12 executing program 5: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x1}}}}, [@NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x69, 0x115, "3b658f0718dc3226d6a0e3826258ac02319f5dd64724cd723a60cc63e48aa6566330069b6fb483860779a81c6bdca544f62c7e727807d3f9a119294e756904edb20dc29e702f401e765a8a2bab926bdb34e89bb7842a3038442f017e75e78d260e8ec1c3b4"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0x87a0d}, @NL80211_ATTR_SOCKET_OWNER={0x4}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1fbf}]}, 0xb8}}, 0x4000004) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0xd5eb, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffff98) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x2, 0xffffe76e, "0a1059a2535f92866c19d386f7f0881617609a9fc68c0e6ddf2071de7a4987543300d579153f8548e0558ed7b955423257bda0ee64fb45359357f776866c466af4eef366bdece6efc4a0d76c27f20fbc6ab34d9c4076d482ac34485cfa0119cb2c42223272cbbf63dd12da6a993a4ce4270e0df240f972920a5c11b1f6b8da055efac9eef9f020b746fbbad407bacf7a47cf3a2a04490d0074c8c9891c8a481554d1c3356217c37d54b7fdd10bc054ef1786a0af3bfb78a99234490df1159856920272640fe7bcc4cc3bf47b7d595097c3bf4c7cb4788065f14e26dd26ff04a6da770adec8c5130d04bf8297793c68e997676b119534bb7d9795eaccfac759a7", 0x59, 0x41, 0x89, 0x20, 0x3, 0x80, 0x78, 0x1}, r0}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffff98) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x2, 0xffffe76e, "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", 0x59, 0x41, 0x89, 0x20, 0x3, 0x80, 0x78, 0x1}, r0}}, 0x128) (async) 00:27:12 executing program 5: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x101, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 5: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffff98) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x2, 0xffffe76e, "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", 0x59, 0x41, 0x89, 0x20, 0x3, 0x80, 0x78, 0x1}, r0}}, 0x128) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x82, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8b7d9bd21f8f70e12167fd9051ffbe157f580d4dee7b71956b3beac7faa17f9607ca4786023f3e59f7c11457b33c6a98f55e0620021496a8f75bd162978bd362c8aa05456aa631caf2dad3ba3d6df8ca4a9ad4effc791867e0b964e4130d52f4ad32ddcdd4b6f052a3eaa475eb54824376ff641a24f522c8a9aa40f196dd70d2f904de7b8ad66aee0802388a8d9c5d2f85821f8ea56891a76b9368029e5ea286965fe60f474d759e4b3efc29ac79b8b9e260b52c88f1f3531a33ef44c06eff89ae450ad038bec9091633f9aa6754e1bea2d4f8152e71f2a943fe0c553555f204a03f1f921d7ddfb53d4ff2adf97a85a7f59f872b703cdfda90530e80848da314", 0x0, 0x69, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 5: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = fork() kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r0, 0x0) 00:27:12 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) 00:27:12 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x81, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 5: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}, 0x10) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) r2 = fork() kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r0, 0x0) 00:27:12 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 00:27:12 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 5: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = fork() kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r0, 0x0) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8b7d9bd21f8f70e12167fd9051ffbe157f580d4dee7b71956b3beac7faa17f9607ca4786023f3e59f7c11457b33c6a98f55e0620021496a8f75bd162978bd362c8aa05456aa631caf2dad3ba3d6df8ca4a9ad4effc791867e0b964e4130d52f4ad32ddcdd4b6f052a3eaa475eb54824376ff641a24f522c8a9aa40f196dd70d2f904de7b8ad66aee0802388a8d9c5d2f85821f8ea56891a76b9368029e5ea286965fe60f474d759e4b3efc29ac79b8b9e260b52c88f1f3531a33ef44c06eff89ae450ad038bec9091633f9aa6754e1bea2d4f8152e71f2a943fe0c553555f204a03f1f921d7ddfb53d4ff2adf97a85a7f59f872b703cdfda90530e80848da314", 0x0, 0x0, 0x0, 0x0, 0x7f, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 00:27:12 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8b7d9bd21f8f70e12167fd9051ffbe157f580d4dee7b71956b3beac7faa17f9607ca4786023f3e59f7c11457b33c6a98f55e0620021496a8f75bd162978bd362c8aa05456aa631caf2dad3ba3d6df8ca4a9ad4effc791867e0b964e4130d52f4ad32ddcdd4b6f052a3eaa475eb54824376ff641a24f522c8a9aa40f196dd70d2f904de7b8ad66aee0802388a8d9c5d2f85821f8ea56891a76b9368029e5ea286965fe60f474d759e4b3efc29ac79b8b9e260b52c88f1f3531a33ef44c06eff89ae450ad038bec9091633f9aa6754e1bea2d4f8152e71f2a943fe0c553555f204a03f1f921d7ddfb53d4ff2adf97a85a7f59f872b703cdfda90530e80848da314", 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}}}, 0x128) 00:27:12 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x128) 00:27:12 executing program 5: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 3: bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x7, 0x0, 0x6, "a527c04e817733bd4034c3719ee0574d85833250a32a2e92b43cc4490d3a81d56d3e89846cf3de4de4728a9fec6d60279d08c4f6019ffb57f3a26051011511", 0x1c}, 0x60) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) (async) 00:27:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:12 executing program 3: bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 00:27:12 executing program 5: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) fork() (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) (async) socket(0x2a, 0x5, 0x1de) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) (async) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) (async) 00:27:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) (async) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:12 executing program 4: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) [ 68.787904][ T24] audit: type=1400 audit(1641342432.833:102): avc: denied { create } for pid=11483 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 00:27:12 executing program 3: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 2: sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004804}, 0x20004000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) syz_genetlink_get_family_id$team(&(0x7f0000000280), r1) 00:27:12 executing program 4: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:12 executing program 5: r0 = fork() (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 3: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:12 executing program 2: sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004804}, 0x20004000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) syz_genetlink_get_family_id$team(&(0x7f0000000280), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004804}, 0x20004000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'}) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) syz_genetlink_get_family_id$team(&(0x7f0000000280), r1) (async) 00:27:12 executing program 4: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:12 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0xffff, &(0x7f0000000040)={[0x3fd]}, 0x8) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000600)={0x9}) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f00000000c0)={0x80002000}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="390000005c0820169699429ecf55768f6c383e4fe15671e01d52f47508ca66515b08f52c392bbbfba5243ff70934fc39225190488c4dcbcb5ebb29cd071e7fc2e4d3b31c09", @ANYRES16=0x0, @ANYBLOB="f26928bd7000fbdbdf2504000000040004001400040003000000070000009d0b0000020a000008000400090000000500060008000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4850}, 0x5841) 00:27:12 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:13 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:13 executing program 3: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:13 executing program 2: sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004804}, 0x20004000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) syz_genetlink_get_family_id$team(&(0x7f0000000280), r1) 00:27:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:27:13 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x71e3c6a7f0e7855a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x284080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x3a) 00:27:13 executing program 4: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:13 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:13 executing program 3: fork() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x600, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x46}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x11}]}, 0x28}, 0x1, 0x0, 0x0, 0x2404c854}, 0x48840) 00:27:13 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x71e3c6a7f0e7855a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x284080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x3a) 00:27:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:27:13 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = epoll_create1(0x80000) (rerun: 64) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0xffff, &(0x7f0000000040)={[0x3fd]}, 0x8) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000600)={0x9}) (async, rerun: 64) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') (rerun: 64) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f00000000c0)={0x80002000}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="390000005c0820169699429ecf55768f6c383e4fe15671e01d52f47508ca66515b08f52c392bbbfba5243ff70934fc39225190488c4dcbcb5ebb29cd071e7fc2e4d3b31c09", @ANYRES16=0x0, @ANYBLOB="f26928bd7000fbdbdf2504000000040004001400040003000000070000009d0b0000020a000008000400090000000500060008000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4850}, 0x5841) 00:27:13 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:27:13 executing program 4: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) socket$nl_generic(0x10, 0x3, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:13 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x71e3c6a7f0e7855a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x284080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x3a) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x71e3c6a7f0e7855a, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x284080, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x3a) (async) 00:27:13 executing program 3: fork() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:27:13 executing program 3: fork() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) socket$nl_generic(0x10, 0x3, 0x10) 00:27:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x8, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:13 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:13 executing program 4: r0 = fork() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:13 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x5, 0x6, "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", 0x0, 0x7b, 0x8, 0x2, 0x1, 0x1, 0x2, 0x1}, r0}}, 0x128) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {r0, 0xffff, 0x0, 0x0, 0x0, @ib={0x1b, 0x81, 0x3, {"eb27b916dc3d91cf9029c3409614c4d9"}, 0x7, 0x200, 0x101}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}}, 0x118) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000440)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000840)={{r1}, 0x0, 0x10, @unused=[0x1, 0x4, 0x9, 0x9], @devid=r5}) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0xebb8}}, 0x10) 00:27:13 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) [ 70.091457][ T1809] ================================================================== [ 70.099577][ T1809] BUG: KCSAN: data-race in shmem_unlink / vfs_getattr_nosec [ 70.106957][ T1809] [ 70.109276][ T1809] write to 0xffff888102f92458 of 8 bytes by task 6706 on cpu 1: [ 70.116904][ T1809] shmem_unlink+0x117/0x1a0 [ 70.121410][ T1809] shmem_rename2+0x199/0x2d0 [ 70.126087][ T1809] vfs_rename+0x9d9/0xe00 [ 70.130422][ T1809] do_renameat2+0x6d7/0xa20 [ 70.134928][ T1809] __x64_sys_rename+0x58/0x60 [ 70.139617][ T1809] do_syscall_64+0x44/0xd0 [ 70.144040][ T1809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.149940][ T1809] [ 70.152262][ T1809] read to 0xffff888102f92458 of 8 bytes by task 1809 on cpu 0: [ 70.159804][ T1809] vfs_getattr_nosec+0x242/0x2f0 [ 70.164754][ T1809] vfs_statx+0x138/0x2a0 [ 70.169007][ T1809] __se_sys_newfstatat+0x63/0x260 [ 70.174040][ T1809] __x64_sys_newfstatat+0x51/0x60 [ 70.179073][ T1809] do_syscall_64+0x44/0xd0 [ 70.183495][ T1809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.189410][ T1809] [ 70.191729][ T1809] value changed: 0x000000000000161c -> 0x0000000000001608 [ 70.198827][ T1809] [ 70.201146][ T1809] Reported by Kernel Concurrency Sanitizer on: [ 70.207284][ T1809] CPU: 0 PID: 1809 Comm: udevd Not tainted 5.16.0-rc8-syzkaller #0 [ 70.215173][ T1809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.225223][ T1809] ================================================================== 00:27:14 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0xffff, &(0x7f0000000040)={[0x3fd]}, 0x8) (async, rerun: 64) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async, rerun: 64) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000600)={0x9}) (async) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f00000000c0)={0x80002000}) (async) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="390000005c0820169699429ecf55768f6c383e4fe15671e01d52f47508ca66515b08f52c392bbbfba5243ff70934fc39225190488c4dcbcb5ebb29cd071e7fc2e4d3b31c09", @ANYRES16=0x0, @ANYBLOB="f26928bd7000fbdbdf2504000000040004001400040003000000070000009d0b0000020a000008000400090000000500060008000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4850}, 0x5841) 00:27:14 executing program 3: fork() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 00:27:14 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x5, 0x6, "9b2815bc8f889697e620935e83c885e8ad700bdbf02ce3bb7c01fd3f87d9ba4f9388bb2413831187a5289782e7b12196cc0863fb21c00210e07d18026df9cf4c78868036865a24e1bf2f4d04c92dcc9762b5ec44685e0d39c948a803e3a855e209327141805738f6beedd34160a22e4fed72be84dbdbd146f3b652e3e2cf20c391472f3a4ab12fc4d2a3cc77047a00f0bbd4a69170f0dec9d2a05583074ffde2d50a91389f3768a651f98137b3803b6ade8ead7eed909ec17470dc41de0220a1f0fd76ab62b19dcf8b1820408a3cd816d7af8ded5199a57a12a3316dc0155a4048d6bf9315bdbf9a27e257ecb9477c4694708598b44a0bbdda4596e2a2afcd44", 0x0, 0x7b, 0x8, 0x2, 0x1, 0x1, 0x2, 0x1}, r0}}, 0x128) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {r0, 0xffff, 0x0, 0x0, 0x0, @ib={0x1b, 0x81, 0x3, {"eb27b916dc3d91cf9029c3409614c4d9"}, 0x7, 0x200, 0x101}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}}, 0x118) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) (async) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000440)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000840)={{r1}, 0x0, 0x10, @unused=[0x1, 0x4, 0x9, 0x9], @devid=r5}) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0xebb8}}, 0x10) 00:27:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x2}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:14 executing program 4: r0 = fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:14 executing program 1: setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) 00:27:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e20, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:14 executing program 1: setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) 00:27:14 executing program 4: r0 = fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:14 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x5, 0x6, "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", 0x0, 0x7b, 0x8, 0x2, 0x1, 0x1, 0x2, 0x1}, r0}}, 0x128) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {r0, 0xffff, 0x0, 0x0, 0x0, @ib={0x1b, 0x81, 0x3, {"eb27b916dc3d91cf9029c3409614c4d9"}, 0x7, 0x200, 0x101}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}}, 0x118) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000440)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000840)={{r1}, 0x0, 0x10, @unused=[0x1, 0x4, 0x9, 0x9], @devid=r5}) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0xebb8}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x5, 0x6, "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", 0x0, 0x7b, 0x8, 0x2, 0x1, 0x1, 0x2, 0x1}, r0}}, 0x128) (async) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {r0, 0xffff, 0x0, 0x0, 0x0, @ib={0x1b, 0x81, 0x3, {"eb27b916dc3d91cf9029c3409614c4d9"}, 0x7, 0x200, 0x101}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}}, 0x118) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r4) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000440)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000840)={{r1}, 0x0, 0x10, @unused=[0x1, 0x4, 0x9, 0x9], @devid=r5}) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0xebb8}}, 0x10) (async) 00:27:14 executing program 3: fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) 00:27:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:15 executing program 3: fork() socket(0x2a, 0x5, 0x1de) 00:27:15 executing program 1: fork() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 00:27:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:15 executing program 5: r0 = epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000080)={r0, r0, 0x101}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r1, 0x0) 00:27:15 executing program 4: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 1: fork() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 00:27:15 executing program 4: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1, 0x4}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:15 executing program 3: socket(0x2a, 0x5, 0x1de) 00:27:15 executing program 5: r0 = epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000080)={r0, r0, 0x101}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r1, 0x0) epoll_create1(0x80000) (async) pipe2$9p(&(0x7f0000000040), 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x1}, 0x10) (async) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000080)={r0, r0, 0x101}) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r1, 0x0) (async) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:15 executing program 4: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, 0xffffffffffffffff, 0x20}}, 0x48) 00:27:15 executing program 5: r0 = epoll_create1(0x80000) (async) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000080)={r0, r0, 0x101}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r1, 0x0) 00:27:15 executing program 3: socket(0x0, 0x5, 0x1de) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) fork() (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) (async) 00:27:15 executing program 4: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 1: fork() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 00:27:15 executing program 4: fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) 00:27:15 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) epoll_create1(0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000000)={{}, 0x0, 0x0, @unused=[0x1, 0x5, 0x849, 0x8f7], @subvolid=0x40}) 00:27:15 executing program 3: socket(0x0, 0x5, 0x1de) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 00:27:15 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) epoll_create1(0x0) (async) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000000)={{}, 0x0, 0x0, @unused=[0x1, 0x5, 0x849, 0x8f7], @subvolid=0x40}) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) 00:27:15 executing program 3: socket(0x0, 0x5, 0x1de) 00:27:15 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:15 executing program 1: fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) 00:27:15 executing program 4: fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) 00:27:15 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) epoll_create1(0x0) (async) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000000)={{}, 0x0, 0x0, @unused=[0x1, 0x5, 0x849, 0x8f7], @subvolid=0x40}) 00:27:15 executing program 1: fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) 00:27:15 executing program 4: fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 3: socket(0x2a, 0x0, 0x1de) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x3, 0x11}}}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY={0x5c, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "57ac32f28b"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xc81cfef946e9428}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "1dee6c2144b0b452a2956d2e00"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "e395e6dbc89067858505fcdcd0"}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xbc}}, 0x840) r0 = socket$isdn(0x22, 0x3, 0x3) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000300)=0x1, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"9b9453266a4447576527bef4545594a0", 0x0, r1, {0x8, 0x8001}, {0x2, 0xf89}, 0x2, [0x1, 0x8, 0x1, 0xffffffff, 0x4, 0x4, 0x1, 0x2, 0x8, 0x8, 0x8, 0x200, 0x2, 0x200, 0x4c69d56e]}) 00:27:15 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:15 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) r1 = socket(0x15, 0x5, 0xfff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x1ec5, 0x3c}}}}, [@NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x20}]}, 0x30}}, 0x24000801) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x4, 0x1, 0x2, "248cfdedf1d3ca5f1657e6a3d69d6063615feda3c053430724797d01322a0a8dd75a9bdf4777e52f27eaf9f3089f6c16bb3ae9b0b4dd8e4b78b52349c153ea", 0x3b}, 0x60) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r5, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_START_NAN(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x61}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008080}, 0x44000) 00:27:15 executing program 3: socket(0x2a, 0x0, 0x0) 00:27:15 executing program 3: fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 4: r0 = epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000080)={r0, r0, 0x101}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r1, 0x0) 00:27:15 executing program 1: fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) 00:27:15 executing program 4: r0 = epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000080)={r0, r0, 0x101}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r1, 0x0) 00:27:15 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x3, 0x11}}}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY={0x5c, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "57ac32f28b"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xc81cfef946e9428}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "1dee6c2144b0b452a2956d2e00"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "e395e6dbc89067858505fcdcd0"}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xbc}}, 0x840) (async) r0 = socket$isdn(0x22, 0x3, 0x3) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) (async) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000300)=0x1, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"9b9453266a4447576527bef4545594a0", 0x0, r1, {0x8, 0x8001}, {0x2, 0xf89}, 0x2, [0x1, 0x8, 0x1, 0xffffffff, 0x4, 0x4, 0x1, 0x2, 0x8, 0x8, 0x8, 0x200, 0x2, 0x200, 0x4c69d56e]}) 00:27:15 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) r1 = socket(0x15, 0x5, 0xfff) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x1ec5, 0x3c}}}}, [@NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x20}]}, 0x30}}, 0x24000801) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x4, 0x1, 0x2, "248cfdedf1d3ca5f1657e6a3d69d6063615feda3c053430724797d01322a0a8dd75a9bdf4777e52f27eaf9f3089f6c16bb3ae9b0b4dd8e4b78b52349c153ea", 0x3b}, 0x60) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async, rerun: 64) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r5, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_START_NAN(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x61}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008080}, 0x44000) [ 71.876306][ T24] audit: type=1400 audit(1641342435.913:103): avc: denied { create } for pid=11793 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 00:27:15 executing program 3: fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:15 executing program 1: fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:16 executing program 4: r0 = epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000080)={r0, r0, 0x101}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r1, 0x0) 00:27:16 executing program 3: fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) 00:27:16 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x3, 0x11}}}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY={0x5c, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "57ac32f28b"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xc81cfef946e9428}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "1dee6c2144b0b452a2956d2e00"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "e395e6dbc89067858505fcdcd0"}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xbc}}, 0x840) r0 = socket$isdn(0x22, 0x3, 0x3) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000300)=0x1, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"9b9453266a4447576527bef4545594a0", 0x0, r1, {0x8, 0x8001}, {0x2, 0xf89}, 0x2, [0x1, 0x8, 0x1, 0xffffffff, 0x4, 0x4, 0x1, 0x2, 0x8, 0x8, 0x8, 0x200, 0x2, 0x200, 0x4c69d56e]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x3, 0x11}}}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY={0x5c, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "57ac32f28b"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xc81cfef946e9428}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "1dee6c2144b0b452a2956d2e00"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "e395e6dbc89067858505fcdcd0"}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xbc}}, 0x840) (async) socket$isdn(0x22, 0x3, 0x3) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000300)=0x1, 0x4) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"9b9453266a4447576527bef4545594a0", 0x0, r1, {0x8, 0x8001}, {0x2, 0xf89}, 0x2, [0x1, 0x8, 0x1, 0xffffffff, 0x4, 0x4, 0x1, 0x2, 0x8, 0x8, 0x8, 0x200, 0x2, 0x200, 0x4c69d56e]}) (async) 00:27:16 executing program 1: fork() socket(0x2a, 0x5, 0x1de) [ 71.970828][ T24] audit: type=1400 audit(1641342435.953:104): avc: denied { create } for pid=11794 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 00:27:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004804}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x6}}, 0x20) 00:27:16 executing program 4: r0 = epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040), 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000080)={r0, r0, 0x101}) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:16 executing program 3: fork() 00:27:16 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) r1 = socket(0x15, 0x5, 0xfff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x1ec5, 0x3c}}}}, [@NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x20}]}, 0x30}}, 0x24000801) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x4, 0x1, 0x2, "248cfdedf1d3ca5f1657e6a3d69d6063615feda3c053430724797d01322a0a8dd75a9bdf4777e52f27eaf9f3089f6c16bb3ae9b0b4dd8e4b78b52349c153ea", 0x3b}, 0x60) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r5, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_START_NAN(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x61}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008080}, 0x44000) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) (async) socket(0x15, 0x5, 0xfff) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x1ec5, 0x3c}}}}, [@NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x20}]}, 0x30}}, 0x24000801) (async) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x4, 0x1, 0x2, "248cfdedf1d3ca5f1657e6a3d69d6063615feda3c053430724797d01322a0a8dd75a9bdf4777e52f27eaf9f3089f6c16bb3ae9b0b4dd8e4b78b52349c153ea", 0x3b}, 0x60) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r5, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) (async) sendmsg$NL80211_CMD_START_NAN(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x61}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008080}, 0x44000) (async) 00:27:16 executing program 4: epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040), 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x1}, 0x10) 00:27:16 executing program 1: fork() socket(0x2a, 0x5, 0x1de) 00:27:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004804}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x6}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004804}, 0x1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x6}}, 0x20) (async) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:16 executing program 3: fork() 00:27:16 executing program 4: epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040), 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) 00:27:16 executing program 1: fork() socket(0x2a, 0x5, 0x1de) 00:27:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004804}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x6}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004804}, 0x1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x6}}, 0x20) (async) 00:27:16 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x2) epoll_pwait2(r0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x5, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)={[0x3]}, 0x8) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000000)={r2, r3, 0x7}) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:16 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:27:16 executing program 4: epoll_create1(0x80000) pipe2$9p(&(0x7f0000000040), 0x0) 00:27:16 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:16 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) 00:27:16 executing program 4: pipe2$9p(&(0x7f0000000040), 0x0) 00:27:16 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:16 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:16 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x5, 0x1de) 00:27:16 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) r0 = epoll_create(0x2) epoll_pwait2(r0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x5, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)={[0x3]}, 0x8) (async) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) (async) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) r3 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000000)={r2, r3, 0x7}) 00:27:16 executing program 4: pipe2$9p(0x0, 0x0) 00:27:16 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) 00:27:16 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x5, 0x1de) [ 72.214951][ T24] audit: type=1400 audit(1641342436.253:105): avc: denied { create } for pid=11887 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 00:27:16 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) 00:27:16 executing program 4: pipe2$9p(0x0, 0x0) 00:27:16 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x5, 0x1de) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:16 executing program 4: pipe2$9p(0x0, 0x0) 00:27:16 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) r0 = epoll_create(0x2) epoll_pwait2(r0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x5, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)={[0x3]}, 0x8) (async, rerun: 32) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) (async, rerun: 32) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async, rerun: 64) r3 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) (rerun: 64) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000000)={r2, r3, 0x7}) 00:27:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) 00:27:16 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) 00:27:16 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x5, 0x1de) 00:27:16 executing program 4: pipe2$9p(0x0, 0x0) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) (async) 00:27:16 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x0, 0x5, 0x1de) 00:27:16 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:16 executing program 4: pipe2$9p(0x0, 0x0) 00:27:16 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:16 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r1 = accept4$nfc_llcp(r0, &(0x7f0000000100), &(0x7f00000001c0)=0x60, 0x80000) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000280)=0x60, 0x80000) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x20, 0x87d8, 0x0, 0x14, r0, 0x4, '\x00', 0x0, r2, 0x4, 0x5, 0x3, 0x2}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x49) [ 72.451272][ T24] audit: type=1400 audit(1641342436.493:106): avc: denied { map_create } for pid=11990 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x0, 0x5, 0x1de) 00:27:17 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0xc8c80, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000a80)={{r2}, 0x0, 0x12, @unused=[0x5, 0x6, 0x80, 0xfffffffffffffbff], @devid}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xd2}) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) fork() 00:27:17 executing program 4: pipe2$9p(0x0, 0x0) 00:27:17 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r1 = accept4$nfc_llcp(r0, &(0x7f0000000100), &(0x7f00000001c0)=0x60, 0x80000) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000280)=0x60, 0x80000) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x20, 0x87d8, 0x0, 0x14, r0, 0x4, '\x00', 0x0, r2, 0x4, 0x5, 0x3, 0x2}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x49) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) (async) accept4$nfc_llcp(r0, &(0x7f0000000100), &(0x7f00000001c0)=0x60, 0x80000) (async) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000280)=0x60, 0x80000) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x20, 0x87d8, 0x0, 0x14, r0, 0x4, '\x00', 0x0, r2, 0x4, 0x5, 0x3, 0x2}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x49) (async) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) fork() 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x0, 0x5, 0x1de) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) fork() 00:27:17 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r1 = accept4$nfc_llcp(r0, &(0x7f0000000100), &(0x7f00000001c0)=0x60, 0x80000) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000280)=0x60, 0x80000) (async) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x20, 0x87d8, 0x0, 0x14, r0, 0x4, '\x00', 0x0, r2, 0x4, 0x5, 0x3, 0x2}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x49) 00:27:17 executing program 4: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x0, 0x5, 0x1de) 00:27:17 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0xc8c80, 0x0) (async) r2 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000a80)={{r2}, 0x0, 0x12, @unused=[0x5, 0x6, 0x80, 0xfffffffffffffbff], @devid}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xd2}) [ 73.238295][ T24] audit: type=1400 audit(1641342437.283:107): avc: denied { create } for pid=12017 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 4: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x0, 0x5, 0x1de) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x7fff, "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", 0x81, 0x3, 0xa6, 0x1, 0x50, 0x1, 0x8, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x31de}}, 0x18) 00:27:17 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0xc8c80, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000a80)={{r2}, 0x0, 0x12, @unused=[0x5, 0x6, 0x80, 0xfffffffffffffbff], @devid}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xd2}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0xc8c80, 0x0) (async) socket$rxrpc(0x21, 0x2, 0x2) (async) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000a80)={{r2}, 0x0, 0x12, @unused=[0x5, 0x6, 0x80, 0xfffffffffffffbff], @devid}) (async) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xd2}) (async) 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x0, 0x1de) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), 0xffffffffffffffff) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x7fff, "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", 0x81, 0x3, 0xa6, 0x1, 0x50, 0x1, 0x8, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x31de}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x7fff, "3586e0c716cce2520e2a0c69ee6185c713c4214cd7f04a5b0628e370836fae152b5a1c3a7371b225299169a70995bddcda5c2bf13b5aa1c718b9e0292053cb67b18b07065989e87b4e0cf1e311951e87a022221f73c730b4a95e61ec3e5ae9f87d048aaf4edf58c2da68293f1413b16df90d5b17bed4ab85efc6ee3f1478384e0e38d7ef86ca9e792c259dede0bbb0cbe267071bf9502df5e5f6f79ec89f2f87cda3a6df11192b8f67e5dde500a4dc799127e1ab08d319005ec49237c1d901373b93021cb9c1020d139b3d37f3f078a0b24984278c35f476ea1bf3bf86b103ab82502fd60d869039cf817fe61a5f4c854b557eac472fe1a6bb9d990cdd3b9202", 0x81, 0x3, 0xa6, 0x1, 0x50, 0x1, 0x8, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x31de}}, 0x18) (async) [ 73.314515][ T24] audit: type=1400 audit(1641342437.303:108): avc: denied { ioctl } for pid=12017 comm="syz-executor.5" path="/dev/vsock" dev="devtmpfs" ino=231 ioctlcmd=0x9417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 00:27:17 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, 0x0) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), 0xffffffffffffffff) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x7fff, "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", 0x81, 0x3, 0xa6, 0x1, 0x50, 0x1, 0x8, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x31de}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r3) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x7fff, "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", 0x81, 0x3, 0xa6, 0x1, 0x50, 0x1, 0x8, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x31de}}, 0x18) (async) 00:27:17 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x0, 0x1de) 00:27:17 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, 0x0) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), 0xffffffffffffffff) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f00000013c0)={0x355b, 0xb, [{0x3}, {0xb, 0x1}, {0x0, 0x1}, {0xf, 0x1}, {0xf}, {0xe}, {0x6, 0x1}, {0x1, 0x1}, {0x6}, {0x8, 0x1}, {0x2, 0x1}]}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000680)={'wlan0\x00'}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r4, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000128bd7000fcdbdf2553000099000400000020000000"], 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000012c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000001380)={'sit0\x00', &(0x7f0000001300)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x3, 0xfffff948, 0xd, @dev={0xfe, 0x80, '\x00', 0x18}, @dev={0xfe, 0x80, '\x00', 0xc}, 0x7800, 0x10, 0xdd, 0x8}}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001600)={&(0x7f0000001780)={0x234, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x21df24a9ef981479}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xf0, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x10000800}, 0x1) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000002c0)={{r0}, 0x0, 0x2, @inherit={0x78, &(0x7f0000000080)={0x1, 0x6, 0x8, 0x0, {0x6, 0x10000, 0x20, 0x100000000, 0xe2}, [0x23c, 0xfffffffffffff3d8, 0x3, 0xfff, 0x5, 0x6]}}, @subvolid=0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e24, 0x7fff, @private1}, r8}}, 0x38) 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x0, 0x1de) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r0, 0x0) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 5: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x5, 0x0) 00:27:17 executing program 3: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f00000013c0)={0x355b, 0xb, [{0x3}, {0xb, 0x1}, {0x0, 0x1}, {0xf, 0x1}, {0xf}, {0xe}, {0x6, 0x1}, {0x1, 0x1}, {0x6}, {0x8, 0x1}, {0x2, 0x1}]}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000680)={'wlan0\x00'}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r4, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000128bd7000fcdbdf2553000099000400000020000000"], 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000012c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000001380)={'sit0\x00', &(0x7f0000001300)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x3, 0xfffff948, 0xd, @dev={0xfe, 0x80, '\x00', 0x18}, @dev={0xfe, 0x80, '\x00', 0xc}, 0x7800, 0x10, 0xdd, 0x8}}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001600)={&(0x7f0000001780)={0x234, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x21df24a9ef981479}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xf0, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x10000800}, 0x1) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000002c0)={{r0}, 0x0, 0x2, @inherit={0x78, &(0x7f0000000080)={0x1, 0x6, 0x8, 0x0, {0x6, 0x10000, 0x20, 0x100000000, 0xe2}, [0x23c, 0xfffffffffffff3d8, 0x3, 0xfff, 0x5, 0x6]}}, @subvolid=0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e24, 0x7fff, @private1}, r8}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f00000013c0)={0x355b, 0xb, [{0x3}, {0xb, 0x1}, {0x0, 0x1}, {0xf, 0x1}, {0xf}, {0xe}, {0x6, 0x1}, {0x1, 0x1}, {0x6}, {0x8, 0x1}, {0x2, 0x1}]}) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000680)={'wlan0\x00'}) (async) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r4, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000128bd7000fcdbdf2553000099000400000020000000"], 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000012c0)) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000001380)={'sit0\x00', &(0x7f0000001300)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x3, 0xfffff948, 0xd, @dev={0xfe, 0x80, '\x00', 0x18}, @dev={0xfe, 0x80, '\x00', 0xc}, 0x7800, 0x10, 0xdd, 0x8}}) (async) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001600)={&(0x7f0000001780)={0x234, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x21df24a9ef981479}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xf0, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x10000800}, 0x1) (async) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000002c0)={{r0}, 0x0, 0x2, @inherit={0x78, &(0x7f0000000080)={0x1, 0x6, 0x8, 0x0, {0x6, 0x10000, 0x20, 0x100000000, 0xe2}, [0x23c, 0xfffffffffffff3d8, 0x3, 0xfff, 0x5, 0x6]}}, @subvolid=0x8}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r8}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e24, 0x7fff, @private1}, r8}}, 0x38) (async) 00:27:17 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) fork() 00:27:17 executing program 5: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:17 executing program 3: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = fork() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, r3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fork() 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x5, 0x0) 00:27:17 executing program 5: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) fork() (async) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) (async) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) (async) 00:27:17 executing program 3: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r0, 0x0, 0x2, 0x4}}, 0x20) fork() 00:27:17 executing program 1: fork() openat$vsock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) socket(0x2a, 0x5, 0x0) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f00000013c0)={0x355b, 0xb, [{0x3}, {0xb, 0x1}, {0x0, 0x1}, {0xf, 0x1}, {0xf}, {0xe}, {0x6, 0x1}, {0x1, 0x1}, {0x6}, {0x8, 0x1}, {0x2, 0x1}]}) (async) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000680)={'wlan0\x00'}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r4, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000128bd7000fcdbdf2553000099000400000020000000"], 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000012c0)={'batadv0\x00', 0x0}) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000001380)={'sit0\x00', &(0x7f0000001300)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x3, 0xfffff948, 0xd, @dev={0xfe, 0x80, '\x00', 0x18}, @dev={0xfe, 0x80, '\x00', 0xc}, 0x7800, 0x10, 0xdd, 0x8}}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001600)={&(0x7f0000001780)={0x234, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x21df24a9ef981479}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xf0, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x10000800}, 0x1) (async, rerun: 64) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000002c0)={{r0}, 0x0, 0x2, @inherit={0x78, &(0x7f0000000080)={0x1, 0x6, 0x8, 0x0, {0x6, 0x10000, 0x20, 0x100000000, 0xe2}, [0x23c, 0xfffffffffffff3d8, 0x3, 0xfff, 0x5, 0x6]}}, @subvolid=0x8}) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r8}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e24, 0x7fff, @private1}, r8}}, 0x38) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 5: r0 = fork() r1 = fork() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4094}, 0x4000080) 00:27:17 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) fork() 00:27:17 executing program 1: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:17 executing program 4: fork() [ 73.752463][T12208] cgroup: fork rejected by pids controller in /syz3 00:27:17 executing program 5: r0 = fork() (async) r1 = fork() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, 0x0) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) (async) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4094}, 0x4000080) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 00:27:17 executing program 1: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 4: fork() 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 00:27:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:17 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) (async) 00:27:17 executing program 5: r0 = fork() r1 = fork() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4094}, 0x4000080) fork() (async) fork() (async) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) (async) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4094}, 0x4000080) (async) 00:27:17 executing program 4: fork() 00:27:17 executing program 1: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:17 executing program 0: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:18 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x5, @mcast1, 0x4}, {0xa, 0x4e23, 0x4, @private0, 0x8}, 0xffffffffffffffff, 0x40ee00}}, 0x48) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00f7ff", @ANYRESDEC=r0, @ANYBLOB="10002bbd7000e97b54a51ab2fbdbdf250700000005002e000100000008000b00fbffffff0800310000000000ad3ebaa64c432ee673edd5f095fda5c35e36e921a61bafff1d1c2b29fb88993f912fe8a931bfcb9e721e1549a13e4c808f901859900c4125994a386a82c86c98a4f71a981306494d005b842cca585a924f2fd053b25f571b6c80ce3b3a2258f5aeb97cee5f1160e199b00df513d01c4be9307f020e9d3e6811715556967a168356aa6a1ca7ede18ded5746ab2cb620453d48440edad02e225a4ee3aecb67"], 0x2c}}, 0x4800) 00:27:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fork() 00:27:18 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fork() 00:27:18 executing program 1: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:18 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 00:27:18 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x5, @mcast1, 0x4}, {0xa, 0x4e23, 0x4, @private0, 0x8}, 0xffffffffffffffff, 0x40ee00}}, 0x48) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00f7ff", @ANYRESDEC=r0, @ANYBLOB="10002bbd7000e97b54a51ab2fbdbdf250700000005002e000100000008000b00fbffffff0800310000000000ad3ebaa64c432ee673edd5f095fda5c35e36e921a61bafff1d1c2b29fb88993f912fe8a931bfcb9e721e1549a13e4c808f901859900c4125994a386a82c86c98a4f71a981306494d005b842cca585a924f2fd053b25f571b6c80ce3b3a2258f5aeb97cee5f1160e199b00df513d01c4be9307f020e9d3e6811715556967a168356aa6a1ca7ede18ded5746ab2cb620453d48440edad02e225a4ee3aecb67"], 0x2c}}, 0x4800) 00:27:18 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 00:27:18 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:18 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x5, @mcast1, 0x4}, {0xa, 0x4e23, 0x4, @private0, 0x8}, 0xffffffffffffffff, 0x40ee00}}, 0x48) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00f7ff", @ANYRESDEC=r0, @ANYBLOB="10002bbd7000e97b54a51ab2fbdbdf250700000005002e000100000008000b00fbffffff0800310000000000ad3ebaa64c432ee673edd5f095fda5c35e36e921a61bafff1d1c2b29fb88993f912fe8a931bfcb9e721e1549a13e4c808f901859900c4125994a386a82c86c98a4f71a981306494d005b842cca585a924f2fd053b25f571b6c80ce3b3a2258f5aeb97cee5f1160e199b00df513d01c4be9307f020e9d3e6811715556967a168356aa6a1ca7ede18ded5746ab2cb620453d48440edad02e225a4ee3aecb67"], 0x2c}}, 0x4800) 00:27:18 executing program 1: r0 = fork() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:18 executing program 0: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:18 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 00:27:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fork() 00:27:18 executing program 0: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = fork() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) 00:27:18 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x12, 0x10}, 0x18) socket$caif_stream(0x25, 0x1, 0x5) 00:27:18 executing program 1: fork() epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x101) 00:27:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) fork() 00:27:18 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x3}}, 0x20) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) fork() 00:27:18 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x12, 0x10}, 0x18) socket$caif_stream(0x25, 0x1, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x12, 0x10}, 0x18) (async) socket$caif_stream(0x25, 0x1, 0x5) (async) 00:27:18 executing program 5: kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000300)={"ee3f9d0dd831b60b8df072a63f3583d9", 0x0, 0x0, {0xbcf, 0x7}, {0x4, 0x9}, 0x400, [0x9, 0x8ee, 0x2518feef, 0x4, 0x0, 0xfffffffffffffff9, 0x8, 0x3, 0xfffffffffffffff9, 0x9, 0x1, 0x7f, 0x40, 0x5, 0x9ab, 0x7fff]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2a4000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB=',\r\x00\x00', @ANYRES16=r2, @ANYBLOB="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